US20240037277A1 - Cloud-based system for protecting sensitive information in shared content - Google Patents

Cloud-based system for protecting sensitive information in shared content Download PDF

Info

Publication number
US20240037277A1
US20240037277A1 US18/481,681 US202318481681A US2024037277A1 US 20240037277 A1 US20240037277 A1 US 20240037277A1 US 202318481681 A US202318481681 A US 202318481681A US 2024037277 A1 US2024037277 A1 US 2024037277A1
Authority
US
United States
Prior art keywords
digital asset
designated
designated digital
owner
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/481,681
Inventor
Jeffrey Damick
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Capital One Services LLC
Original Assignee
Capital One Services LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Capital One Services LLC filed Critical Capital One Services LLC
Priority to US18/481,681 priority Critical patent/US20240037277A1/en
Assigned to CAPITAL ONE SERVICES, LLC reassignment CAPITAL ONE SERVICES, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DAMICK, JEFFREY
Publication of US20240037277A1 publication Critical patent/US20240037277A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/103Formatting, i.e. changing of presentation of documents
    • G06F40/106Display of layout of documents; Previewing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/12Use of codes for handling textual entities
    • G06F40/151Transformation
    • G06F40/16Automatic learning of transformation rules, e.g. from examples
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/169Annotation, e.g. comment data or footnotes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/205Parsing
    • G06F40/216Parsing using statistical methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/30Semantic analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Definitions

  • the present disclosure generally relates to cloud-based systems and methods for content sharing, and more particularly, to a cloud-based content-sharing system which identifies and removes sensitive information from a digital asset to be shared with other users.
  • Cloud-based secure storage provides a convenient way for users to store their valuable digital assets, such as bank statements, salary stubs, shopping receipts, credit reports, medical reports, school transcripts, photos, video clips, etc.
  • a digital asset may be any digital data capable of being stored in cloud storage.
  • Popular cloud storage services also allow users to freely share their stored digital assets with others. For example, a car dealer may upload a receipt to a user's cloud storage account, saving the user the trouble of keeping a physical copy of the receipt.
  • an accountant may upload a tax return form to the user's cloud storage account for the user's review and signature or a copy of a filed tax return for the user's records.
  • a user may also share her own digital assets with other people or entities. For example, the user may want to post some photos stored in her cloud storage account to a social media website. As another example, the user may need to share her salary stubs stored in the cloud storage account with a landlord in order to complete a rental application.
  • the digital assets stored in a user's cloud storage account may contain sensitive information that the user does not want to disclose to other people.
  • the user may wish to alter, e.g., redact, remove, or obscure, sensitive information contained in a digital asset.
  • the user may want to conceal her social security number, personal phone number, etc.
  • the user may not want to share photos of her children.
  • the disclosed embodiments include cloud-based content-sharing systems and methods.
  • a system for sharing data includes a memory storing instructions and one or more processors in communication with a storage device.
  • the one or more processors are configured to execute the stored instructions to: receive, from a client device, an instruction for sharing a designated digital asset; retrieve the designated digital asset from the storage device; determine provenance of the designated digital asset based on metadata of the designated digital asset; generate authentication information based on the provenance of the designated digital asset; identify sensitive information in the designated digital asset; generate a redacted version of the designated digital asset by modifying content of the designated digital asset to alter the identified sensitive information; and provide the redacted version and authentication information of the designated digital asset to a recipient of the designated digital asset.
  • a computer-implemented content-sharing method may include receiving, from a client device, an instruction for sharing a designated digital asset.
  • the method may also include retrieving the designated digital asset from a storage device.
  • the method may also include determining provenance of the designated digital asset based on metadata of the designated digital asset.
  • the method may also include generating authentication information based on the provenance of the designated digital asset.
  • the method may also include identifying sensitive information in the designated digital asset.
  • the method may also include generating a redacted version of the designated digital asset by modifying content of the designated digital asset to alter the identified sensitive information.
  • the method may further include providing the redacted version and authentication information of the designated digital asset to a recipient of the designated digital asset.
  • aspects of the disclosed embodiments may include non-transitory, tangible computer-readable media that store software instructions that, when executed by one or more processors, are configured for and capable of performing and executing one or more of the methods, operations, and the like consistent with the disclosed embodiments. Also, aspects of the disclosed embodiments may be performed by one or more processors that are configured as special-purpose processor(s) based on software instructions that are programmed with logic and instructions that perform, when executed, one or more operations consistent with the disclosed embodiments.
  • FIG. 1 is a schematic diagram illustrating an exemplary cloud-based system for content sharing, consistent with disclosed embodiments.
  • FIG. 2 is a block diagram of a cloud server used in the system of FIG. 1 , consistent with disclosed embodiments.
  • FIG. 3 is a block diagram of an exemplary user device used in the system of FIG. 1 , consistent with disclosed embodiments.
  • FIG. 4 is a flowchart of an exemplary content-sharing method, consistent with disclosed embodiments.
  • FIG. 5 is a flowchart of an exemplary method for generating a redacted version of a digital asset, consistent with disclosed embodiments.
  • FIG. 6 is a flowchart of an exemplary method for receiving a shared digital asset, consistent with disclosed embodiments.
  • FIG. 7 is a flowchart of an exemplary content-sharing method, consistent with disclosed embodiments.
  • the disclosed embodiments are directed to cloud-based systems and methods for sharing digital assets.
  • the disclosed systems provide online storage environments for storing digital assets owned by users.
  • a system may automatically identify sensitive information in the digital asset and generate a redacted version of the digital asset by removing, redacting, or otherwise obscuring the identified sensitive information.
  • the system may automatically identify sensitive information in the digital asset allow the user to select what action to take (e.g., allowing the user to remove, redact, or otherwise obscure some or all of the identified information or to send the digital asset without alterations).
  • the system may also determine provenance of the digital asset based on metadata of the digital asset and generate authentication or verification information for the digital asset.
  • the system may further provide the redacted version and the authentication/verification information of the digital asset to a recipient. This way, the asset sender's sensitive information can be kept confidential, while the authenticity of the redacted version is evident to the recipient.
  • sensitive information refers to information which an owner of a digital asset does not want to share with other people.
  • a non-exhaustive list of sensitive information may include personally-identifiable information, such as an address, a photo of the user's residence or family members, a social security number, a financial account number, a patient ID or even appointment dates shown on a medical record, an email address, and/or a phone number.
  • the sensitive information may include trade secret or classified information of an organization or company.
  • the sensitive information may include privileged information, such as communication between an attorney and her client.
  • owner refers to a person or entity whose sensitive information is contained in the digital asset. Often, the owner of the sensitive information also owns the digital asset, but digital assets may be owned by other users or entities.
  • FIG. 1 is a schematic diagram illustrating an exemplary cloud-based system 100 for content sharing, consistent with disclosed embodiments.
  • system 100 may include owner device 110 associated with owner 112 , user device 120 associated with user 122 , a third party computer 130 associated with third party institution 132 , a cloud server 140 , and a cloud storage 150 .
  • the components of system 100 may communicate with each other via a network 190 .
  • Network 190 may comprise any type of computer networking arrangement used to exchange data.
  • network 190 may be the Internet, a private data network, virtual private network using a public network, and/or other suitable connection(s) that enables system 100 to send and receive information between the components of system 100 .
  • Network 190 may also include a public switched telephone network (“PSTN”) and/or a wireless network.
  • PSTN public switched telephone network
  • Cloud server 140 may be operated by a provider of cloud computing services. Cloud server 140 is configured to manage a cloud storage service. For example, cloud server 140 may be configured to receive an uploaded digital asset, e.g., owner 112 , user 122 , third party institution 132 , authenticate the digital asset, and save the digital asset in an online storage device, such as cloud storage 150 .
  • the digital asset may be uploaded by the owner 112 of the digital asset (e.g., via owner device 110 or any device connected to network 190 ), another individual (e.g., via user device 120 or any device connected to network 190 ), or a third party institution 132 (e.g., via third party computer 130 or any device connected to network 190 ).
  • cloud server 140 may retrieve the digital asset from the online storage device, redact, remove, or otherwise obscure sensitive information from the digital asset, generate authentication information of the digital asset, and send the revised digital asset and the authentication information to a destination device. Instead of automatically redacting, removing, or otherwise obscuring sensitive information, cloud server 140 may or identify potentially information for the owner and allow the owner to redact, remove, or otherwise obscure some or all of the sensitive information (i.e., allowing the user to approve or reject some or all of the proposed redactions).
  • the request may be from owner 112 of the digital asset (e.g., via owner device 110 or any device connected to network 190 ), another individual (e.g., via user device 120 or any device connected to network 190 ), or a third party institution 132 (e.g., via third party computer 130 or any device connected to network 190 ).
  • the recipient of the digital asset may be owner 112 of the digital asset (e.g., via owner device 110 or any device connected to network 190 ), another individual (e.g., via user device 120 or any device connected to network 190 ), or a third party institution 132 (e.g., via third party computer 130 or any device connected to network 190 ).
  • Any number of cloud servers 140 may be included in system 100 , and cloud server 140 may comprise any number of physical, virtual, shared, or distributed devices.
  • FIG. 2 is a block diagram of cloud server 140 , consistent with disclosed embodiments.
  • cloud server 140 may include one or more of processors 210 , input/output (I/O) devices 220 , a memory 230 storing programs 240 including, for example, server app(s) 242 , operating system 244 , and storing data 250 , and a database 260 .
  • Cloud server 140 may be a single server or may be configured as a distributed computer system including multiple servers or computers that interoperate to perform one or more of the processes and functionalities associated with the disclosed embodiments.
  • Processor 210 may be one or more known processing devices, such as a microprocessor from the PentiumTM family manufactured by IntelTM or the TurionTM family manufactured by AMDTM. Processor 210 may constitute a single core or multiple core processors that executes parallel processes simultaneously. For example, processor 210 may be a single core processor configured with virtual processing technologies. In certain embodiments, processor 210 may use logical processors to simultaneously execute and control multiple processes. Processor 210 may implement virtual machine technologies, or other known technologies to provide the ability to execute, control, run, manipulate, store, etc. multiple software processes, applications, programs, etc.
  • processor 210 may include a multiple-core processor arrangement (e.g., dual, quad core, etc.) configured to provide parallel processing functionalities to allow cloud server 140 to execute multiple processes simultaneously.
  • processor arrangement e.g., dual, quad core, etc.
  • processor arrangements could be implemented that provide for the capabilities disclosed herein.
  • I/O devices 220 may be one or more devices configured to allow data to be received and/or transmitted by cloud server 140 .
  • I/O devices 220 may include one or more user I/O devices and/or components, such as those associated with a keyboard, mouse, touchscreen, display, etc.
  • I/O devices 220 may also include one or more digital and/or analog communication devices that allow cloud server 140 to communicate with other machines and devices, such as other components of system 100 .
  • I/O devices 220 may also include interface hardware configured to receive input information and/or display or otherwise provide output information.
  • I/O devices 220 may include a monitor configured to display a user interface.
  • Cloud server 140 may include one or more storage devices configured to store information used by processor 210 (or other components) to perform certain functions related to the disclosed embodiments.
  • cloud server 140 may include memory 230 that includes instructions to enable processor 210 to execute one or more applications, such as server applications, an electronic transaction application, network communication processes, and any other type of application or software known to be available on computer systems.
  • the instructions, application programs, etc. may be stored in an internal database 260 or external storage (e.g., cloud storage 150 in FIG. 1 ) in direct communication with cloud server 140 , such as one or more database or memory accessible over network 190 .
  • Database 260 or other external storage may be a volatile or non-volatile, magnetic, semiconductor, tape, optical, removable, non-removable, or other type of storage device or tangible (i.e., non-transitory) computer-readable medium.
  • cloud server 140 may include memory 230 that includes instructions that, when executed by processor 210 , perform one or more processes consistent with the functionalities disclosed herein.
  • cloud server 140 may include memory 230 that may include one or more programs 240 to perform one or more functions of the disclosed embodiments.
  • processor 210 may execute one or more programs located remotely from system 100 .
  • cloud server 140 may access one or more remote programs, that, when executed, perform functions related to disclosed embodiments.
  • Programs 240 stored in memory 230 and executed by processor(s) 210 may include one or more server app(s) 242 and operating system 244 .
  • Server app(s) 242 may incorporate one or more apps that cause processor(s) 210 to execute one or more processes related to online storage and content sharing, including but not limited to, authenticating a digital asset, detecting sensitive information on the digital asset, removing, redacting, or otherwise obscuring the sensitive information from the digital asset before sharing the digital asset with other devices, etc.
  • Memory 230 and database 260 may include one or more memory devices that store data and instructions used to perform one or more features of the disclosed embodiments. Memory 230 and database 260 may also include any combination of one or more databases controlled by memory controller devices (e.g., server(s), etc.) or software, such as document management systems, Microsoft® SQL databases, SharePoint® databases, OracleTM databases, SybaseTM databases, or other relational databases. Memory 230 and database 260 may also store the digital asset uploaded or owned by a user, such as owner 112 , user 122 , and third party institution 132 .
  • a user such as owner 112 , user 122 , and third party institution 132 .
  • cloud server 140 may also be communicatively connected to one or more remote memory devices, such as cloud storage 150 , through network 190 or a different network.
  • Cloud storage 150 may be configured to store information and may be accessed and/or managed by cloud server 140 .
  • the uploaded digital assets may be saved in cloud storage 150 .
  • cloud storage 150 may be document management systems, Microsoft® SQL database, SharePoint® databases, OracleTM databases, SybaseTM databases, or other relational databases. Systems and methods consistent with disclosed embodiments, however, are not limited to separate databases or even to the use of a database.
  • Cloud server 140 and/or cloud storage 150 may generate and store a record of when a digital asset is uploaded to the system and/or downloaded.
  • Information stored in the record may include, for example, the person or entity uploading, requesting, or receiving the record; the time of the activity; the version of the document uploaded, requested, or received; the alterations made to the document before it was downloaded or sent to the recipient; a copy of the document downloaded or sent to the recipient, etc.
  • cloud server 140 may use this information to determine the provenance of a digital asset.
  • the record can be viewed by the owner of the digital asset to track the usage and movement the digital asset.
  • FIG. 3 is a block diagram of owner device 110 , consistent with disclosed embodiments.
  • owner device 110 may be a mobile phone, a personal computer, a wearable device (e.g., a smart watch, smart glasses, etc.), a digital broadcast terminal, a messaging device, a gaming console, a tablet computer, a medical device, exercise equipment, a personal digital assistant, and the like.
  • owner device 110 may include a processor 310 , a content-sharing application 320 , a memory 330 , a user interface 340 , a communication interface 350 , and a multimedia component 360 .
  • Processor 310 may be similar to processor 210 .
  • processor 310 may include any appropriate type of general purpose or special-purpose microprocessor, digital signal processor, or microprocessor.
  • Processor 310 may be configured as a separate processor module dedicated to performing the disclosed methods for content sharing.
  • processor 310 may be configured as a shared processor module for performing other functions of owner device 110 unrelated to the disclosed methods for content sharing.
  • processor 310 may execute computer instructions (program codes) stored in memory module 330 , and may perform functions in accordance with exemplary techniques described in this disclosure.
  • Memory 330 may include any appropriate type of mass storage provided to store any type of information that processor 310 may need to operate.
  • Memory 330 may be a volatile or non-volatile, magnetic, semiconductor, tape, optical, removable, non-removable, or other type of storage device or tangible (i.e., non-transitory) computer-readable medium including, but not limited to, a ROM, a flash memory, a dynamic RAM, and a static RAM.
  • Memory 330 may be configured to store one or more computer programs that may be executed by processor 310 to perform the disclosed methods for content sharing.
  • Content-sharing application 320 may be a module dedicated to performing some or all steps of the disclosed methods for content sharing.
  • Content-sharing application 320 may be configured as hardware, software, or a combination thereof.
  • content-sharing application 320 may be implemented as computer codes stored in memory 330 and executable by processor 310 .
  • content-sharing application 320 may be implemented as a special-purpose processor, such as an application-specific integrated circuit (ASIC), dedicated for performing the disclosed methods for content sharing.
  • ASIC application-specific integrated circuit
  • content-sharing application 320 may be implemented as an embedded system or firmware.
  • User interface 340 may include a display panel.
  • the display panel may include a liquid crystal display (LCD), a light-emitting diode (LED), a plasma display, a projection, or any other type of display, and may also include microphones, speakers, and/or audio input/outputs (e.g., headphone jacks).
  • LCD liquid crystal display
  • LED light-emitting diode
  • plasma display a plasma display
  • projection a projection
  • audio input/outputs e.g., headphone jacks
  • User interface 340 may also be configured to receive input or commands from owner 112 .
  • the display panel may be implemented as a touch screen to receive input signals from the user.
  • the touch screen includes one or more touch sensors to sense touches, swipes, and other gestures on the touch screen.
  • the touch sensors may not only sense a boundary of a touch or swipe action, but also sense a period of time and a pressure associated with the touch or swipe action.
  • user interface 340 may include other input devices such as keyboards, buttons, joysticks, and/or tracker balls.
  • User interface 340 may be configured to send the user input to processor 310 and/or content-sharing application 320 .
  • Communication interface 350 can access a wireless network based on one or more communication standards, such as WiFi, LTE, 2G, 3G, 4G, 5G, etc.
  • communication interface 350 may include a near field communication (NFC) module to facilitate short-range communications between owner device 110 and other devices.
  • NFC near field communication
  • communication interface 350 may be implemented based on a radio-frequency identification (RFID) technology, an infrared data association (IrDA) technology, an ultra-wideband (UWB) technology, a Bluetooth® technology, or other technologies.
  • RFID radio-frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth® or other technologies.
  • Optional multimedia component 360 may be any device that generates a digital asset that may be stored in cloud server 140 .
  • multimedia component 360 may include an audio recorder, a front camera, a rear camera, a biometric reader, etc.
  • multimedia component 360 may be a front camera that can take a photograph, creating a new digital asset, while owner device 110 is in an operation mode. Owner device 110 may then synchronize the captured photo to cloud storage 150 in real time and store it in owner 112 's cloud storage account.
  • various multimedia components 260 may be used to upload audio recordings, photos, videos, biometric data, or other digital assets.
  • owner 112 may have a cloud storage account registered with cloud server 140 and/or cloud storage 150 .
  • Owner 112 may upload, through owner device 110 , digital assets to cloud storage 150 for storage.
  • the digital assets may include text documents, image files, photos, videos, audio files, or any other type of digital data capable of being stored in cloud storage 150 .
  • owner 112 may instruct, through owner device 110 , cloud server 140 to share one or more digital assets stored in owner 112 's cloud storage account to other users, such as user device 120 and/or third-party computer 130 .
  • User device 120 may be associated with a user 122 , who may be any individual, such as a friend, coworker, landlord, business associate, or other associate of owner 112 .
  • Third-party computer 130 may be associated with a third party institution, such as a government agency, a merchant, a business, a hospital, etc.
  • owner 112 may also receive digital assets shared by user 122 and/or third party institution 132 via the cloud storage service.
  • owner 112 , user 122 , and third party institution 132 may share various digital assets among each other.
  • a user may share her photo with a friend, or receive a work report from a coworker.
  • a tenant may send a pay stub to a landlord as part of an application for renting an apartment.
  • a patient may receive a medical lab report from a clinic.
  • the structures of user device 120 and third party computer 130 are similar to those of owner device 110 and/or cloud server 140 . It is to be understood that the configuration and boundaries of the functional building blocks of system 100 have been defined herein as exemplary configurations only. Alternative configurations may be defined so long as the functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments.
  • FIG. 4 is a flowchart of an exemplary content-sharing method 400 , consistent with disclosed embodiments.
  • method 400 may be performed by cloud server 140 .
  • owner 112 may have a cloud storage account registered with cloud server 140 and cloud storage 150 .
  • the cloud storage account serves as a digital safe deposit box for owner 112 to store her digital assets in a secure, cloud-based storage environment.
  • owner 112 may also use the cloud storage account to share the digital assets with other individuals or organizations, such as user 122 and third party institution 132 .
  • these digital assets often contain sensitive information that owner 112 does not wish to disclose to user 122 or third party institution 132 .
  • method 400 may be performed by cloud server 140 to remove, redact, or otherwise obscure the sensitive information from a digital asset to be shared.
  • method 400 may include the following steps.
  • cloud server 140 receives, from owner device 110 , an instruction to share a designated digital asset with a designated recipient.
  • owner 112 may activate content-sharing application 320 on owner device 110 to access her digital assets stored on cloud storage 150 .
  • Content-sharing application 320 may display, in user interface 340 , a list of digital assets owned by owner 112 and saved on cloud storage 150 .
  • Owner 112 may then select one or more digital assets from the list to share with other people or entities.
  • the designated recipient may be user 122 or third-party institution 132 , who may use user device 120 and third-party computer 130 , respectively, to access or receive the shared digital asset(s).
  • the designated recipient may be owner 112 ; that is, owner 112 may request a copy of a document (e.g., to print and mail, for personal records, to send using a method outside of the cloud storage service system, etc.) Consistent with the disclosed embodiments, owner 112 may voluntarily initiate the asset sharing with user 122 and/or third-party institution 132 .
  • owner 112 may initiate the asset sharing in response to a request from user 122 and/or third-party institution 132 .
  • owner 112 may receive the request via content-sharing application 320 .
  • the request may specify which asset(s) is/are requested.
  • owner 112 may receive a request from a friend for sharing photos taken at a recent event or receive a request from a bank for providing additional supporting documents for a loan application.
  • owner 112 may use content-sharing application 320 to share the requested digital asset(s) with user 122 and/or third party institution 132 .
  • owner 112 may instruct the system to send the digital asset(s) to owner 112 (e.g., to owner device 110 ). In this way, owner 112 may save, print out, email, or otherwise distribute the digital asset outside of the system.
  • cloud server 140 retrieves the designated digital asset from cloud storage 150 .
  • cloud server 140 may send a query including an identifier of the designated digital asset to cloud storage 150 .
  • Cloud storage 150 may then return the designated digital asset and metadata of the designated digital asset to cloud server 140 via network 190 .
  • cloud server 140 determines provenance of the designated digital asset based on metadata of the designated digital asset.
  • Data provenance also known as data lineage, refers to data origin or data history of the designated digital asset.
  • the data provenance or lineage includes but is not limited to information regarding the origin or source of the digital asset, processes that have influenced (e.g., altered or manipulated) the digital asset, the chain of custody of the designated digital asset since the asset was created, the movement path of the asset between different databases, etc.
  • the metadata of the designated digital asset may include various kinds of information describing document history and document property of the designated digital asset.
  • cloud server 140 may trace and determine the provenance of the designated digital asset.
  • cloud server 140 may determine the origin of the designated digital asset, such as the original creator of the digital asset, the party from who owner 112 received the digital asset, etc., based on the digital asset's metadata.
  • the metadata may include the IP address of the device from which the designated digital asset was first uploaded to owner 112 's cloud storage account. Based on the IP address, cloud server 140 may determine the identity of the person or entity that creates the designated digital asset.
  • cloud server 140 may also trace the past operations performed on the designated digital asset.
  • the metadata may indicate the time when the digital asset was first deposited into owner 112 's cloud storage account.
  • the metadata may also describe past modifications to the designated digital asset, when these modifications are performed, and who performed these modifications.
  • the metadata may also indicate who accessed the designated digital asset in the past and when the digital asset was accessed. By examining the metadata, cloud server 140 may determine whether the digital asset has been altered or manipulated since it was created or first owned by owner 112 .
  • cloud server 140 may also trace the chain of custody of the designated digital asset since the creation of the digital asset.
  • the designated digital asset may be a credit report generated by a credit bureau, such as Experian® and TransUnion®, and provided by the credit bureau to owner 112 's bank. The bank subsequently shared the credit report with owner 112 .
  • cloud server 140 may determine that the credit bureau, the bank, and owner 112 all have been in possession of the credit report and further determine the respective possession periods.
  • cloud server 140 may authenticate the digital asset based on credential of the asset's creator. For example, if the designated digital asset is a driving record created by a Department of Motor Vehicles, cloud server 140 may determine that the designated digital asset is authentic.
  • cloud server 140 may also authenticate the designated digital asset based on historical operations performed on the designated digital asset. For example, if it is determined that the designated digital asset was not modified since it was uploaded into owner 112 's cloud storage account, cloud server 140 may determine the digital asset is authentic.
  • cloud server 140 may also assign an authentication score to the designated digital asset to measure the degree of authenticity. For example, cloud server 140 may assign a high authentication score to a digital asset received by owner 112 from a friend, coworker, or family member, and assign a low authentication score to documents received from a person to whom owner 112 only has a low affinity. As another example, although a digital asset has a long chain of custody, cloud server 140 may still assign a high authentication score to the digital asset if each custodian in the chain is highly credible.
  • cloud server 140 In optional step 408 , cloud server 140 generates authentication information based on the provenance of the designated digital asset. Specifically, cloud server 140 may authenticate the digital asset based on the provenance of the designated digital asset.
  • cloud server 140 may generate an authentication certificate to certify the authenticity of the digital asset.
  • the authentication certificate may be in the form of a document attached to the designated digital asset and indicating that the authenticity of the designated digital asset is certified by the cloud service provider.
  • the authentication certificate may be in the form of a digital signature attached to the designated digital asset.
  • cloud server 140 may create an encrypted digital code appended to the designated digital asset.
  • cloud server 140 may create the encrypted digital code by generating a one-way hash of the designated digital asset and then encrypting the hash with a private key. The presence of a digital certification indicates the designated digital asset is created by a credible user and the digital asset has not been altered without authorization.
  • cloud server 140 may generate an authentication report indicating the provenance of the designated digital asset.
  • the authentication report may also include an authentication score of the digital asset. For example, if cloud server 140 determines that the creator of the designated digital asset cannot be authenticated or the designated digital asset may have been altered, the authentication report may include a low authentication score and indicate the reasons for such low score.
  • cloud server 140 identifies sensitive information in the designated digital asset.
  • Cloud server 140 may analyze patterns of content data in the designated digital asset and identify the data patterns that match the signature patterns of the sensitive information. Specifically, cloud server 140 may determine the file format of the designated digital asset based on the metadata of the digital asset.
  • File format refers to the standard ways that a digital asset can be created and/or stored, such as PDF (Portable Document Format), Microsoft® Word, CSV (Comma Separated Values)), TAX (TurboTax® file), JPEG (Joint Photographic Experts Group), TIFF (Tagged Image File Format), etc.
  • the designated digital asset may have a file extension specifying the asset's file format.
  • a “doc” file extension indicates that the designated digital asset is a word processing file
  • a “dbf” file extension indicates that the designated digital asset is a database file
  • an “xml” file extension indicates that the designated digital asset is an extensible markup language file.
  • cloud server 140 may select a file-processing application suitable for accessing the data content of the designated digital asset. For example, cloud server 140 may use a text editor to access a text file and use image-processing software to access image data of a photo.
  • Cloud server 140 may analyze the content data and identify portions of the content data that have patterns matching the signature patterns of the sensitive information. Consistent with the disclosed embodiments, when the content data includes text information, cloud server 140 may identify text fields matching a text pattern such as a social security number, a bank account number, a phone number, a selected word or name, etc. In some embodiments, cloud server 140 may identify the text fields using recognition techniques such as named-entity recognition. Named-entity recognition may be applied to text data to identify and categorize text fields into predefined text categories, e.g., identification numbers, locations, individuals, dates, etc. Once a text field is identified and categorized, cloud server 140 may determine whether the text field corresponds to sensitive information.
  • recognition techniques such as named-entity recognition. Named-entity recognition may be applied to text data to identify and categorize text fields into predefined text categories, e.g., identification numbers, locations, individuals, dates, etc.
  • an identification number such as a social security number, a driver's license number, a phone number, etc.
  • cloud server 140 may consider a text field categorized as an individual as corresponding to sensitive information if the text field matches a name included in a list of predetermined names.
  • cloud server 140 may also use other pattern-matching techniques to identify certain regular expressions, wildcards, literal character strings, etc.
  • cloud server 140 may extract features of the image data and determine whether the features represent a predetermined person or object. For example, owner 112 may prefer not to share her children's photos with other people, and thus set the images of the children as part of the sensitive information.
  • cloud server 140 may employ an image-recognition application to detect whether the photo contains data representing a child. If data representing a human face are detected, cloud server 140 may determines the photo contains sensitive information.
  • cloud server 140 may employ a facial-recognition application to extract features representing a human face from the image data of the photo, and then compare the extracted features with pre-stored features that represent owner 112 's children. If a match is found, cloud server 140 may conclude that the photo contains owner 112 's children.
  • cloud server 140 may also use optical character recognition (OCR) tools to identify sensitive information contained in the designated digital asset.
  • OCR optical character recognition
  • cloud server 140 may convert the designated digital asset into to a document image.
  • Cloud server 140 may then perform OCR on the document image by recognizing the characters in the document image as text and generate a bounding rectangle for each of the characters.
  • a bounding rectangle is described by bounding coordinates on vertical and horizontal axes that form a geometric rectangle surrounding a corresponding character or word in the document image.
  • the bounding rectangle also includes a buffer area that extends the area surrounding the character. The buffer area may be determined using a preconfigured surrounding threshold that defines the additional area (i.e., additional height and width) that should be included in the bounding rectangle.
  • the preconfigured surrounding threshold may be a random value within a range of potential values so that the buffer area is a different height and width for each bounding rectangle.
  • the buffer area may ensure that redaction boxes generated using the bounding rectangle better obfuscate a redacted character or word.
  • Cloud server 140 may also search for characters and/or words in the OCR results that match the text pattern of certain sensitive information. For example, cloud server 140 may search the OCR results of a document image for a social security number. If characters matching the social security number are found, cloud server 140 may determine the text location of the social security number in the image document as the location of the bounding rectangles of the matching characters.
  • cloud server 140 may also identify the sensitive information in the designated digital asset content based on the content of the designated digital asset.
  • the contents of the digital asset may be identified as tax information, medical information, a credit report, photo, purchase receipt, bank account statement, utility bill, etc.
  • the digital asset may contain metadata specifying its content.
  • the header of the designated digital asset may contain a metadata field indicating the content.
  • cloud server 140 may determine which type of sensitive information is present in the designated digital asset. For example, if the digital asset is a tax document, cloud server 140 determines that the relevant sensitive information may include owner 112 's tax ID, social security number, annual gross income, etc. As another example, if the digital asset is a family photo, cloud server 140 determines that the relevant sensitive information may include images of owner 112 's children.
  • cloud server 140 may further locate in the digital asset those data fields with a data pattern matching the determined type of sensitive information. For example, if cloud server 140 determines the digital asset is a tax document and may contain owner 112 's social security number, cloud server 140 may specifically search in the digital asset's content for data fields whose format match the format of a social security number. This targeted search improves the efficiency of identifying and locating sensitive in the designated digital asset.
  • cloud server 140 may also allow owner 112 to select or define the category or type of sensitive information to be redacted from the designated digital asset.
  • cloud server 140 may send instructions to owner device 110 for displaying a user interface.
  • the user interface may list multiple categories of sensitive information selectable by owner 112 . These categories may include, but are not limited to, personal identification numbers (e.g., social security number, user account numbers, etc.), phone numbers, physical addresses, doctor's medical notes, child photos, etc.
  • Cloud server 140 may be configured to only remove, redact, or otherwise obscure the user-selected categories of sensitive information from the designated digital asset. This feature allows owner 112 to flexibly define which categories of sensitive information should be removed, redacted, or otherwise obscured in a particular document.
  • cloud server 140 generates a redacted version of the designated digital asset by modifying the content of the designated digital asset to remove, redact, or otherwise obscure the identified sensitive information.
  • Cloud server 140 may generate the redacted version in various manners.
  • cloud server 140 may generate the redacted version by removing the identified sensitive information from the data constituting the designated digital asset.
  • cloud server 140 may generate the redacted version by replacing the identified sensitive information with random information that is not related to owner 112 . For example, cloud server 140 may replace owner 112 's phone number with a randomly generated number that resembles the format of a common phone number.
  • cloud server 140 may generate the redacted version by generating alteration boxes, e.g., redaction boxes or highlight boxes, to conceal the identified sensitive information. For example, if OCR is used to identify the sensitive information, cloud server 140 may use alteration boxes to cover the bounding rectangles corresponding to the identified sensitive information, and create an updated document image including the alteration boxes, i.e., redactions or highlights. In some embodiments, cloud server 140 may generate the redacted version by obscuring the part of the designated digital asset that includes the identified sensitive information. For example, cloud server 140 may obscure a child face in a photo before the photo is shared.
  • alteration boxes e.g., redaction boxes or highlight boxes
  • cloud server 140 causes owner device 110 to display a preview of the redacted version.
  • cloud server 140 may transmit the redacted version to owner device 110 for display via content-sharing application 320 .
  • Owner 112 may look at the preview and provide feedback on the redacted version via content-sharing application 320 .
  • Owner 112 may accept some, all, or none of the proposed revisions to the digital asset. Owner 112 may also add further revisions to the digital asset. Owner 112 may also change the way the digital asset is revised. For example, the system may propose replacing the owner's social security number with a non-sense set of digits that fit the same format (e.g., replacing the user's social security number with “123-45-6789”). Owner 112 may request that the social security number be redacted using an opaque redaction box to cover the number instead.
  • FIG. 5 is a flowchart of an exemplary method 500 for generating a redacted version of a digital asset, consistent with disclosed embodiments.
  • method 500 may be performed by cloud server 140 to generate a redacted version of the designated version based on user feedback.
  • cloud server 140 In step 502 , cloud server 140 generates a redacted version of the designated digital asset. Cloud server 140 then causes owner device 110 to display a preview of the redacted version and solicit owner 112 ′s feedback. If the redacted version is proper, owner 112 may confirm via content-sharing application 320 that the redacted version is approved for sharing. However, if the redacted version needs to be modified, owner 112 may enter annotations in the asset or provide instructions to content-sharing application 320 to indicate how the modifications should be done.
  • cloud server 140 receives the user feedback from owner device 110 . If the feedback indicates modification to the redacted version is needed, cloud server 140 proceeds to step 506 to update the redacted version based on the user feedback. For example, cloud server 140 may remove, redact, or otherwise obscure, in the designated digital asset, additional data fields that are indicated by owner 112 as containing sensitive information. As another example, if owner 112 indicates certain redacted, removed, or obscured information is not sensitive (i.e., the redaction, removal, or obscuring of the information is not necessary), cloud server 140 may undo the redaction, removal, or obscuring.
  • step 508 cloud server 140 provides the updated version to owner device 110 for display and seeks owner 112 's confirmation. Steps 504 - 508 can be performed repeatedly until owner 112 confirms that the redacted version is approved for sharing. This way, method 500 allows a user to preview a digital asset prior to sharing it with other people and to make desired adjustments to the digital asset.
  • cloud server 140 uses the user feedback to train a machine learning algorithm for identifying sensitive information.
  • the machine learning algorithm may employ a neural network architecture, such as a convolutional neural network (CNN), a deep neural network (DNN), etc.
  • CNN convolutional neural network
  • DNN deep neural network
  • the data fields indicated by owner 112 as containing sensitive information are fed into the neural network to learn the data pattern associated with the sensitive information and the locations of the sensitive information in a digital asset.
  • the trained neural network may then be used in step 502 to determine the proper redaction level for a digital asset and locate the data fields that need to be redacted, removed, or obscured.
  • cloud server 140 provides the redacted version and authentication information of the designated digital asset to a recipient.
  • method 400 provides assurance about the authenticity of the shared digital asset to the recipient, despite part of the information on the shared digital asset is concealed from the recipient.
  • Cloud server 140 may perform step 416 in various manners.
  • cloud server 140 may send the redacted version and authentication information directly to the recipient's device, e.g., user device 120 , third-party computer 130 , or owner device 112 .
  • cloud server 140 may send a prompt to the recipient's device, inviting the recipient to access or retrieve the redacted version (and authentication information, if provided) via the recipient's cloud storage account.
  • cloud server 140 may send a notification message, e.g., an email or text message, to the recipient, inviting the recipient to download the redacted version (and authentication information, if provided) from a secured site.
  • the notification message may include the uniform resource locator (URL) of the site and a downloading password.
  • URL uniform resource locator
  • the disclosed cloud-based content-sharing system can be used by a user to not only share digital assets controlled or owned by the user with other people, but also receive digital content shared by other people to the user.
  • the designated digital asset in method 400 may be originally received by owner 112 from another person or entity, such as user 122 or third party institution 132 .
  • user 122 may be a coworker who wants to send a business proposal to owner 112 .
  • third party institution 132 may be a merchant who wants to send a purchase receipt to owner 112 , or a clinic which needs to send a lab report to owner 112 .
  • FIG. 6 is a flowchart of a method 600 for receiving a shared digital asset, consistent with disclosed embodiments. Referring to FIG. 6 , method 600 may be performed by cloud server 140 and include the following steps.
  • cloud server 140 receives a request for uploading a digital asset to owner 112 's cloud storage account.
  • the request is sent from a device other than owner device 110 , such as user device 120 or third party computer 130 .
  • cloud server 140 verifies credential of the device sending the request.
  • Cloud server 140 may verify the credential in various ways. For example, cloud server 140 may determine whether the request is sent through a verified cloud-storage account. Cloud server 140 may also determine whether the request is sent from a trusted IP address or whether the MAC address of the device sending the request has been registered with cloud server 140 already.
  • cloud server 140 authenticates the uploaded digital asset based on the credential of the device sending the request. If the credential can be verified, cloud server 140 may determine the digital asset is authentic. For example, if the digital asset is a mortgage statement uploaded by a bank, cloud server 140 may conclude the mortgage statement to be authentic.
  • cloud server 140 generates metadata of the uploaded digital asset.
  • the metadata may include provenance information and/or content type of the uploaded digital asset.
  • the provenance information may indicate the identity or name of the person or entity that uploads the digital asset, the IP or MAC address of the device from which the digital asset is uploaded, the date and time when the digital asset is uploaded, etc.
  • the content type may specify the type of content in the uploaded digital asset, such as tax document, medical report, credit report, photo, purchase receipt, back account statement, utility bill, etc.
  • the information about the content type may be entered by the person or entity that uploads the digital asset.
  • Cloud server 140 may write the generated metadata into the file head of the uploaded digital asset.
  • cloud server 140 may encrypt the uploaded digital asset. Specifically, cloud server 140 may apply an algorithm to replace the data of the uploaded digital asset with ciphertext created based on the data.
  • One or more keys may be used to describe a transformation to be applied to the data. The key(s) may then be kept secret such that it may be difficult or impossible to undo the transformation without access to the key(s).
  • Ciphertext may be created based on a wide variety of standards and algorithms. Examples may include symmetric key algorithms, such as the Data Encryption Standard (DES) or Advanced Encryption Standard (AES), or asymmetric key algorithms.
  • DES Data Encryption Standard
  • AES Advanced Encryption Standard
  • cloud server 140 saves the digital asset (e.g., the encrypted digital asset) in cloud storage 150 .
  • the digital asset has been encrypted, a decryption process may be used when it is later accessed or retrieved to convert the ciphertext back to its original data based on the key(s) used to create the ciphertext or other key(s) specifically for decrypting the data.
  • cloud server 140 notifies owner 112 that the uploaded digital asset is available for access. For example, cloud server 140 may send a prompt to owner device 110 , indicating user 122 or third party institution 132 has shared a digital asset with owner 112 and inviting owner 112 to view the uploaded digital asset. As another example, cloud server 140 may notify owner 112 that the uploaded digital asset is available by sending the digital asset to owner 112 (e.g., sending an e-mail with the digital asset attached to owner 112 ).
  • FIG. 7 is a flowchart of an exemplary content-sharing method 700 , consistent with disclosed embodiments.
  • method 700 may be performed by owner device 110 , or, more specifically, content-sharing application 320 on owner device 110 .
  • method 700 may include the following steps.
  • owner device 110 displays an interface for sharing content.
  • the interface may be presented through content-sharing application 320 .
  • owner device 110 receives a selection of a digital asset to be shared and one or more recipients of the digital asset.
  • content-sharing application 320 may display a list of digital assets or file folders currently stored in owner 112 's cloud storage account, such that owner 112 may select one of the stored digital assets for sharing.
  • content-sharing application 320 may display a list of users who are friends of owner 112 , such that owner 112 may select one or more of the users with which to share the digital asset.
  • content-sharing application 320 may provide a search function to search for users or third parties who have accounts with cloud server 140 and select the recipient of the digital asset from the search results.
  • content-sharing application 320 may allow a user to share a digital asset with a recipient who does not have an account with cloud server 140 .
  • owner 112 may enter the desired recipient's email address, phone number, or other contact information in content-sharing application 320 .
  • Cloud server 140 may then use that contact information to, for example, send the recipient an invitation to create a cloud storage account to access the shared digital asset.
  • system 140 may use the contact information to send the recipient a URL for a site where the recipient may download the shared digital asset (e.g., download the asset as a “guest” or without creating an account).
  • cloud server 140 may use the contact information to directly send the digital asset to the recipient (e.g., as an attachment to an e-mail).
  • owner device 110 may receive a user selection of one or more categories of sensitive information to be removed, redacted, or otherwise obscured from the designated digital asset.
  • sensitive information used in the present disclosure may refer to any information an owner may want to redact, such as personally identifying information including, but not limited to, medical records, address, photos, social security numbers, financial account numbers, phone numbers, etc.
  • Owner device 110 may also allow owner 112 to define which type(s) of sensitive information should be removed, redacted, or otherwise obscured. For example, user device 112 may display a list of categories of sensitive information for owner 112 to select, such that information in the selected categories will be removed, redacted, or otherwise obscured, while information in the unselected categories will not be altered.
  • step 708 owner device 110 transmits information about the designated digital asset, identity of the recipient, and user-selected categories of sensitive information to cloud server 140 .
  • step 710 owner device 110 receives a redacted version of the designated digital asset from cloud server 140 .
  • step 712 owner device 110 displays a preview of the redacted version prior to sharing of the designated digital asset.
  • the preview shows how the redacted version will appear when it is viewed by the recipient.
  • owner device 110 receives user feedback on the redacted version.
  • user interface 340 may include a touch screen which displays the preview of the redacted version and allows owner 112 to make annotations directly on the preview. For example, owner 112 may circle around or tab on the data fields that need to be revised.
  • content-sharing application 320 may provide various redaction tools for owner 112 to manually redact additional data fields on the redacted version or undo certain redactions, removals, or obscuring.
  • content sharing application 320 may provide options for the type of removal, redaction, or obscuring used (e.g., allowing an owner to use an opaque redaction box instead of substituting non-sense text, etc.).
  • step 716 owner device 110 transmits the user feedback to cloud server 140 , such that cloud server 140 can adjust the redacted version accordingly.
  • cloud server 140 may send the adjusted version to owner device 110 for user confirmation.
  • cloud server 140 may directly provide the adjusted version to the recipient, without requesting confirmation from owner 112 .
  • some or all of the logic for the above-described techniques may be implemented as a computer program or application or as a plug-in module or subcomponent of another application.
  • the described techniques may be varied and are not limited to the examples or descriptions provided.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Artificial Intelligence (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Cloud-based methods and systems for content sharing are disclosed. In some embodiments, the systems may include one or more processors configured to: receive, from a client device, an instruction for sharing a designated digital asset; retrieve the designated digital asset from a storage device; determine provenance of the designated digital asset based on metadata of the designated digital asset; generate authentication information based on the provenance of the designated digital asset; identify sensitive information in the designated digital asset; generate a redacted version of the designated digital asset by modifying content of the designated digital asset to alter the identified sensitive information; and provide the redacted version and authentication information of the designated digital asset to a recipient of the designated digital asset.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 17/468,881, filed Sep. 8, 2021, which is a continuation of U.S. patent application Ser. No. 16/535,312, filed Aug. 8, 2019, which is a continuation of U.S. patent application Ser. No. 16/028,373, filed Jul. 5, 2018, and entitled “CLOUD-BASED SYSTEM FOR PROTECTING SENSITIVE INFORMATION IN SHARED CONTENT.” The disclosure of the above-referenced applications is expressly incorporated herein by reference in its entirety.
  • TECHNICAL FIELD
  • The present disclosure generally relates to cloud-based systems and methods for content sharing, and more particularly, to a cloud-based content-sharing system which identifies and removes sensitive information from a digital asset to be shared with other users.
  • BACKGROUND
  • Cloud-based secure storage provides a convenient way for users to store their valuable digital assets, such as bank statements, salary stubs, shopping receipts, credit reports, medical reports, school transcripts, photos, video clips, etc. A digital asset may be any digital data capable of being stored in cloud storage. Popular cloud storage services also allow users to freely share their stored digital assets with others. For example, a car dealer may upload a receipt to a user's cloud storage account, saving the user the trouble of keeping a physical copy of the receipt. As another example, an accountant may upload a tax return form to the user's cloud storage account for the user's review and signature or a copy of a filed tax return for the user's records. A user may also share her own digital assets with other people or entities. For example, the user may want to post some photos stored in her cloud storage account to a social media website. As another example, the user may need to share her salary stubs stored in the cloud storage account with a landlord in order to complete a rental application.
  • The digital assets stored in a user's cloud storage account may contain sensitive information that the user does not want to disclose to other people. Thus, prior to sharing or distributing a stored digital assert, the user may wish to alter, e.g., redact, remove, or obscure, sensitive information contained in a digital asset. For example, the user may want to conceal her social security number, personal phone number, etc. As another example, the user may not want to share photos of her children.
  • Typically, the user manually reviews the digital asset to be shared and alters portions of text or images in the digital asset before sharing it to maintain confidentiality of the sensitive information. However, this process is often time consuming and tedious. Moreover, redacting a digital asset such as a photo may require certain level of computer skills that an ordinary user may lack. These issues either keep users from sharing their cloud-stored digital assets, or force users to compromise the confidentiality of their data. Therefore, it is desirable to provide improved cloud-based content-sharing technology to streamline the process of removing, redacting, or otherwise obscuring sensitive information in a digital assert before the asset is shared, and to provide convenient tools for users to protect their sensitive information.
  • SUMMARY
  • The disclosed embodiments include cloud-based content-sharing systems and methods.
  • In one embodiment, a system for sharing data is disclosed. The system includes a memory storing instructions and one or more processors in communication with a storage device. The one or more processors are configured to execute the stored instructions to: receive, from a client device, an instruction for sharing a designated digital asset; retrieve the designated digital asset from the storage device; determine provenance of the designated digital asset based on metadata of the designated digital asset; generate authentication information based on the provenance of the designated digital asset; identify sensitive information in the designated digital asset; generate a redacted version of the designated digital asset by modifying content of the designated digital asset to alter the identified sensitive information; and provide the redacted version and authentication information of the designated digital asset to a recipient of the designated digital asset.
  • In another embodiment, a computer-implemented content-sharing method is disclosed. The method may include receiving, from a client device, an instruction for sharing a designated digital asset. The method may also include retrieving the designated digital asset from a storage device. The method may also include determining provenance of the designated digital asset based on metadata of the designated digital asset. The method may also include generating authentication information based on the provenance of the designated digital asset. The method may also include identifying sensitive information in the designated digital asset. The method may also include generating a redacted version of the designated digital asset by modifying content of the designated digital asset to alter the identified sensitive information. The method may further include providing the redacted version and authentication information of the designated digital asset to a recipient of the designated digital asset.
  • Aspects of the disclosed embodiments may include non-transitory, tangible computer-readable media that store software instructions that, when executed by one or more processors, are configured for and capable of performing and executing one or more of the methods, operations, and the like consistent with the disclosed embodiments. Also, aspects of the disclosed embodiments may be performed by one or more processors that are configured as special-purpose processor(s) based on software instructions that are programmed with logic and instructions that perform, when executed, one or more operations consistent with the disclosed embodiments.
  • It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosed embodiments, as claimed.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate exemplary disclosed embodiments and, together with the description, serve to explain the disclosed embodiments. In the drawings:
  • FIG. 1 is a schematic diagram illustrating an exemplary cloud-based system for content sharing, consistent with disclosed embodiments.
  • FIG. 2 is a block diagram of a cloud server used in the system of FIG. 1 , consistent with disclosed embodiments.
  • FIG. 3 is a block diagram of an exemplary user device used in the system of FIG. 1 , consistent with disclosed embodiments.
  • FIG. 4 is a flowchart of an exemplary content-sharing method, consistent with disclosed embodiments.
  • FIG. 5 is a flowchart of an exemplary method for generating a redacted version of a digital asset, consistent with disclosed embodiments.
  • FIG. 6 is a flowchart of an exemplary method for receiving a shared digital asset, consistent with disclosed embodiments.
  • FIG. 7 is a flowchart of an exemplary content-sharing method, consistent with disclosed embodiments.
  • DETAILED DESCRIPTION
  • Reference will now be made to exemplary embodiments, examples of which are illustrated in the accompanying drawings and disclosed herein. Wherever convenient, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
  • The disclosed embodiments are directed to cloud-based systems and methods for sharing digital assets. In particular, the disclosed systems provide online storage environments for storing digital assets owned by users. In response to the user's request to share a digital asset, a system may automatically identify sensitive information in the digital asset and generate a redacted version of the digital asset by removing, redacting, or otherwise obscuring the identified sensitive information. The system may automatically identify sensitive information in the digital asset allow the user to select what action to take (e.g., allowing the user to remove, redact, or otherwise obscure some or all of the identified information or to send the digital asset without alterations). The system may also determine provenance of the digital asset based on metadata of the digital asset and generate authentication or verification information for the digital asset. The system may further provide the redacted version and the authentication/verification information of the digital asset to a recipient. This way, the asset sender's sensitive information can be kept confidential, while the authenticity of the redacted version is evident to the recipient.
  • As used in the present disclosure, “sensitive information” refers to information which an owner of a digital asset does not want to share with other people. For example, a non-exhaustive list of sensitive information may include personally-identifiable information, such as an address, a photo of the user's residence or family members, a social security number, a financial account number, a patient ID or even appointment dates shown on a medical record, an email address, and/or a phone number. As another example, the sensitive information may include trade secret or classified information of an organization or company. As yet another example, the sensitive information may include privileged information, such as communication between an attorney and her client.
  • As used in the present disclosure, “owner” refers to a person or entity whose sensitive information is contained in the digital asset. Often, the owner of the sensitive information also owns the digital asset, but digital assets may be owned by other users or entities.
  • FIG. 1 is a schematic diagram illustrating an exemplary cloud-based system 100 for content sharing, consistent with disclosed embodiments. Referring to FIG. 1 , system 100 may include owner device 110 associated with owner 112, user device 120 associated with user 122, a third party computer 130 associated with third party institution 132, a cloud server 140, and a cloud storage 150. The components of system 100 may communicate with each other via a network 190.
  • Network 190 may comprise any type of computer networking arrangement used to exchange data. For example, network 190 may be the Internet, a private data network, virtual private network using a public network, and/or other suitable connection(s) that enables system 100 to send and receive information between the components of system 100. Network 190 may also include a public switched telephone network (“PSTN”) and/or a wireless network.
  • Cloud server 140 may be operated by a provider of cloud computing services. Cloud server 140 is configured to manage a cloud storage service. For example, cloud server 140 may be configured to receive an uploaded digital asset, e.g., owner 112, user 122, third party institution 132, authenticate the digital asset, and save the digital asset in an online storage device, such as cloud storage 150. The digital asset may be uploaded by the owner 112 of the digital asset (e.g., via owner device 110 or any device connected to network 190), another individual (e.g., via user device 120 or any device connected to network 190), or a third party institution 132 (e.g., via third party computer 130 or any device connected to network 190). Later, when receiving a request from to share the digital asset, cloud server 140 may retrieve the digital asset from the online storage device, redact, remove, or otherwise obscure sensitive information from the digital asset, generate authentication information of the digital asset, and send the revised digital asset and the authentication information to a destination device. Instead of automatically redacting, removing, or otherwise obscuring sensitive information, cloud server 140 may or identify potentially information for the owner and allow the owner to redact, remove, or otherwise obscure some or all of the sensitive information (i.e., allowing the user to approve or reject some or all of the proposed redactions). The request may be from owner 112 of the digital asset (e.g., via owner device 110 or any device connected to network 190), another individual (e.g., via user device 120 or any device connected to network 190), or a third party institution 132 (e.g., via third party computer 130 or any device connected to network 190). The recipient of the digital asset may be owner 112 of the digital asset (e.g., via owner device 110 or any device connected to network 190), another individual (e.g., via user device 120 or any device connected to network 190), or a third party institution 132 (e.g., via third party computer 130 or any device connected to network 190). Any number of cloud servers 140 may be included in system 100, and cloud server 140 may comprise any number of physical, virtual, shared, or distributed devices.
  • FIG. 2 is a block diagram of cloud server 140, consistent with disclosed embodiments. As shown, cloud server 140 may include one or more of processors 210, input/output (I/O) devices 220, a memory 230 storing programs 240 including, for example, server app(s) 242, operating system 244, and storing data 250, and a database 260. Cloud server 140 may be a single server or may be configured as a distributed computer system including multiple servers or computers that interoperate to perform one or more of the processes and functionalities associated with the disclosed embodiments.
  • Processor 210 may be one or more known processing devices, such as a microprocessor from the Pentium™ family manufactured by Intel™ or the Turion™ family manufactured by AMD™. Processor 210 may constitute a single core or multiple core processors that executes parallel processes simultaneously. For example, processor 210 may be a single core processor configured with virtual processing technologies. In certain embodiments, processor 210 may use logical processors to simultaneously execute and control multiple processes. Processor 210 may implement virtual machine technologies, or other known technologies to provide the ability to execute, control, run, manipulate, store, etc. multiple software processes, applications, programs, etc. In another embodiment, processor 210 may include a multiple-core processor arrangement (e.g., dual, quad core, etc.) configured to provide parallel processing functionalities to allow cloud server 140 to execute multiple processes simultaneously. One of ordinary skill in the art would understand that other types of processor arrangements could be implemented that provide for the capabilities disclosed herein.
  • I/O devices 220 may be one or more devices configured to allow data to be received and/or transmitted by cloud server 140. I/O devices 220 may include one or more user I/O devices and/or components, such as those associated with a keyboard, mouse, touchscreen, display, etc. I/O devices 220 may also include one or more digital and/or analog communication devices that allow cloud server 140 to communicate with other machines and devices, such as other components of system 100. I/O devices 220 may also include interface hardware configured to receive input information and/or display or otherwise provide output information. For example, I/O devices 220 may include a monitor configured to display a user interface.
  • Cloud server 140 may include one or more storage devices configured to store information used by processor 210 (or other components) to perform certain functions related to the disclosed embodiments. In one example, cloud server 140 may include memory 230 that includes instructions to enable processor 210 to execute one or more applications, such as server applications, an electronic transaction application, network communication processes, and any other type of application or software known to be available on computer systems. Alternatively or additionally, the instructions, application programs, etc., may be stored in an internal database 260 or external storage (e.g., cloud storage 150 in FIG. 1 ) in direct communication with cloud server 140, such as one or more database or memory accessible over network 190. Database 260 or other external storage may be a volatile or non-volatile, magnetic, semiconductor, tape, optical, removable, non-removable, or other type of storage device or tangible (i.e., non-transitory) computer-readable medium.
  • In the disclosed embodiments, cloud server 140 may include memory 230 that includes instructions that, when executed by processor 210, perform one or more processes consistent with the functionalities disclosed herein. In some embodiments, cloud server 140 may include memory 230 that may include one or more programs 240 to perform one or more functions of the disclosed embodiments. Moreover, processor 210 may execute one or more programs located remotely from system 100. For example, cloud server 140 may access one or more remote programs, that, when executed, perform functions related to disclosed embodiments.
  • Programs 240 stored in memory 230 and executed by processor(s) 210 may include one or more server app(s) 242 and operating system 244. Server app(s) 242 may incorporate one or more apps that cause processor(s) 210 to execute one or more processes related to online storage and content sharing, including but not limited to, authenticating a digital asset, detecting sensitive information on the digital asset, removing, redacting, or otherwise obscuring the sensitive information from the digital asset before sharing the digital asset with other devices, etc.
  • Memory 230 and database 260 may include one or more memory devices that store data and instructions used to perform one or more features of the disclosed embodiments. Memory 230 and database 260 may also include any combination of one or more databases controlled by memory controller devices (e.g., server(s), etc.) or software, such as document management systems, Microsoft® SQL databases, SharePoint® databases, Oracle™ databases, Sybase™ databases, or other relational databases. Memory 230 and database 260 may also store the digital asset uploaded or owned by a user, such as owner 112, user 122, and third party institution 132.
  • Referring back to FIG. 1 , cloud server 140 may also be communicatively connected to one or more remote memory devices, such as cloud storage 150, through network 190 or a different network. Cloud storage 150 may be configured to store information and may be accessed and/or managed by cloud server 140. The uploaded digital assets may be saved in cloud storage 150. By way of example, cloud storage 150 may be document management systems, Microsoft® SQL database, SharePoint® databases, Oracle™ databases, Sybase™ databases, or other relational databases. Systems and methods consistent with disclosed embodiments, however, are not limited to separate databases or even to the use of a database.
  • Cloud server 140 and/or cloud storage 150 may generate and store a record of when a digital asset is uploaded to the system and/or downloaded. Information stored in the record may include, for example, the person or entity uploading, requesting, or receiving the record; the time of the activity; the version of the document uploaded, requested, or received; the alterations made to the document before it was downloaded or sent to the recipient; a copy of the document downloaded or sent to the recipient, etc. As described in more detail below, cloud server 140 may use this information to determine the provenance of a digital asset. Moreover, the record can be viewed by the owner of the digital asset to track the usage and movement the digital asset.
  • As described above, cloud server 140 and cloud storage 150 may exchange data with other components of system 100. For example, owner 112 may use owner device 110 to upload digital assets to cloud server 140 and/or cloud storage 150 for storage. FIG. 3 is a block diagram of owner device 110, consistent with disclosed embodiments. For example, owner device 110 may be a mobile phone, a personal computer, a wearable device (e.g., a smart watch, smart glasses, etc.), a digital broadcast terminal, a messaging device, a gaming console, a tablet computer, a medical device, exercise equipment, a personal digital assistant, and the like. As shown in FIG. 3 , owner device 110 may include a processor 310, a content-sharing application 320, a memory 330, a user interface 340, a communication interface 350, and a multimedia component 360.
  • Processor 310 may be similar to processor 210. In exemplary embodiments, processor 310 may include any appropriate type of general purpose or special-purpose microprocessor, digital signal processor, or microprocessor. Processor 310 may be configured as a separate processor module dedicated to performing the disclosed methods for content sharing. Alternatively, processor 310 may be configured as a shared processor module for performing other functions of owner device 110 unrelated to the disclosed methods for content sharing. In the exemplary embodiments, processor 310 may execute computer instructions (program codes) stored in memory module 330, and may perform functions in accordance with exemplary techniques described in this disclosure.
  • Memory 330 may include any appropriate type of mass storage provided to store any type of information that processor 310 may need to operate. Memory 330 may be a volatile or non-volatile, magnetic, semiconductor, tape, optical, removable, non-removable, or other type of storage device or tangible (i.e., non-transitory) computer-readable medium including, but not limited to, a ROM, a flash memory, a dynamic RAM, and a static RAM. Memory 330 may be configured to store one or more computer programs that may be executed by processor 310 to perform the disclosed methods for content sharing.
  • Content-sharing application 320 may be a module dedicated to performing some or all steps of the disclosed methods for content sharing. Content-sharing application 320 may be configured as hardware, software, or a combination thereof. For example, content-sharing application 320 may be implemented as computer codes stored in memory 330 and executable by processor 310. As another example, content-sharing application 320 may be implemented as a special-purpose processor, such as an application-specific integrated circuit (ASIC), dedicated for performing the disclosed methods for content sharing. As yet another example, content-sharing application 320 may be implemented as an embedded system or firmware.
  • User interface 340 may include a display panel. The display panel may include a liquid crystal display (LCD), a light-emitting diode (LED), a plasma display, a projection, or any other type of display, and may also include microphones, speakers, and/or audio input/outputs (e.g., headphone jacks).
  • User interface 340 may also be configured to receive input or commands from owner 112. For example, the display panel may be implemented as a touch screen to receive input signals from the user. The touch screen includes one or more touch sensors to sense touches, swipes, and other gestures on the touch screen. The touch sensors may not only sense a boundary of a touch or swipe action, but also sense a period of time and a pressure associated with the touch or swipe action. Alternatively, or in addition, user interface 340 may include other input devices such as keyboards, buttons, joysticks, and/or tracker balls. User interface 340 may be configured to send the user input to processor 310 and/or content-sharing application 320.
  • Communication interface 350 can access a wireless network based on one or more communication standards, such as WiFi, LTE, 2G, 3G, 4G, 5G, etc. In one exemplary embodiment, communication interface 350 may include a near field communication (NFC) module to facilitate short-range communications between owner device 110 and other devices. In other embodiments, communication interface 350 may be implemented based on a radio-frequency identification (RFID) technology, an infrared data association (IrDA) technology, an ultra-wideband (UWB) technology, a Bluetooth® technology, or other technologies.
  • Optional multimedia component 360 may be any device that generates a digital asset that may be stored in cloud server 140. For example, multimedia component 360 may include an audio recorder, a front camera, a rear camera, a biometric reader, etc. For example, multimedia component 360 may be a front camera that can take a photograph, creating a new digital asset, while owner device 110 is in an operation mode. Owner device 110 may then synchronize the captured photo to cloud storage 150 in real time and store it in owner 112's cloud storage account. Similarly, various multimedia components 260 may be used to upload audio recordings, photos, videos, biometric data, or other digital assets.
  • Referring back to FIG. 1 , consistent with the disclosed embodiments, owner 112 may have a cloud storage account registered with cloud server 140 and/or cloud storage 150. Owner 112 may upload, through owner device 110, digital assets to cloud storage 150 for storage. For example, the digital assets may include text documents, image files, photos, videos, audio files, or any other type of digital data capable of being stored in cloud storage 150.
  • In some embodiments, owner 112 may instruct, through owner device 110, cloud server 140 to share one or more digital assets stored in owner 112's cloud storage account to other users, such as user device 120 and/or third-party computer 130. User device 120 may be associated with a user 122, who may be any individual, such as a friend, coworker, landlord, business associate, or other associate of owner 112. Third-party computer 130 may be associated with a third party institution, such as a government agency, a merchant, a business, a hospital, etc. Similarly, owner 112 may also receive digital assets shared by user 122 and/or third party institution 132 via the cloud storage service.
  • Through the cloud storage service managed by cloud server 140, owner 112, user 122, and third party institution 132 may share various digital assets among each other. For example, a user may share her photo with a friend, or receive a work report from a coworker. As another example, a tenant may send a pay stub to a landlord as part of an application for renting an apartment. As yet another example, a patient may receive a medical lab report from a clinic. These are just a few of the many examples of digital assets that may be shared, but generally speaking, any digital asset that can be stored in the cloud can be shared.
  • The structures of user device 120 and third party computer 130 are similar to those of owner device 110 and/or cloud server 140. It is to be understood that the configuration and boundaries of the functional building blocks of system 100 have been defined herein as exemplary configurations only. Alternative configurations may be defined so long as the functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments.
  • FIG. 4 is a flowchart of an exemplary content-sharing method 400, consistent with disclosed embodiments. For example, method 400 may be performed by cloud server 140. As described above, owner 112 may have a cloud storage account registered with cloud server 140 and cloud storage 150. The cloud storage account serves as a digital safe deposit box for owner 112 to store her digital assets in a secure, cloud-based storage environment. Besides storing the digital assets, owner 112 may also use the cloud storage account to share the digital assets with other individuals or organizations, such as user 122 and third party institution 132. However, these digital assets often contain sensitive information that owner 112 does not wish to disclose to user 122 or third party institution 132. As such, method 400 may be performed by cloud server 140 to remove, redact, or otherwise obscure the sensitive information from a digital asset to be shared. Referring to FIG. 4 , method 400 may include the following steps.
  • In step 402, cloud server 140 receives, from owner device 110, an instruction to share a designated digital asset with a designated recipient. For example, owner 112 may activate content-sharing application 320 on owner device 110 to access her digital assets stored on cloud storage 150. Content-sharing application 320 may display, in user interface 340, a list of digital assets owned by owner 112 and saved on cloud storage 150. Owner 112 may then select one or more digital assets from the list to share with other people or entities.
  • The designated recipient may be user 122 or third-party institution 132, who may use user device 120 and third-party computer 130, respectively, to access or receive the shared digital asset(s). The designated recipient may be owner 112; that is, owner 112 may request a copy of a document (e.g., to print and mail, for personal records, to send using a method outside of the cloud storage service system, etc.) Consistent with the disclosed embodiments, owner 112 may voluntarily initiate the asset sharing with user 122 and/or third-party institution 132.
  • Alternatively, owner 112 may initiate the asset sharing in response to a request from user 122 and/or third-party institution 132. In one embodiment, owner 112 may receive the request via content-sharing application 320. The request may specify which asset(s) is/are requested. For example, owner 112 may receive a request from a friend for sharing photos taken at a recent event or receive a request from a bank for providing additional supporting documents for a loan application. According to the request, owner 112 may use content-sharing application 320 to share the requested digital asset(s) with user 122 and/or third party institution 132.
  • As a further alternative, instead of using the system to share the document with the recipient, owner 112 may instruct the system to send the digital asset(s) to owner 112 (e.g., to owner device 110). In this way, owner 112 may save, print out, email, or otherwise distribute the digital asset outside of the system.
  • In step 404, upon receiving the instruction, cloud server 140 retrieves the designated digital asset from cloud storage 150. For example, cloud server 140 may send a query including an identifier of the designated digital asset to cloud storage 150. Cloud storage 150 may then return the designated digital asset and metadata of the designated digital asset to cloud server 140 via network 190.
  • In optional step 406, cloud server 140 determines provenance of the designated digital asset based on metadata of the designated digital asset. Data provenance, also known as data lineage, refers to data origin or data history of the designated digital asset. The data provenance or lineage includes but is not limited to information regarding the origin or source of the digital asset, processes that have influenced (e.g., altered or manipulated) the digital asset, the chain of custody of the designated digital asset since the asset was created, the movement path of the asset between different databases, etc.
  • The metadata of the designated digital asset may include various kinds of information describing document history and document property of the designated digital asset. By analyzing the metadata, cloud server 140 may trace and determine the provenance of the designated digital asset.
  • In some embodiments, cloud server 140 may determine the origin of the designated digital asset, such as the original creator of the digital asset, the party from who owner 112 received the digital asset, etc., based on the digital asset's metadata. For example, the metadata may include the IP address of the device from which the designated digital asset was first uploaded to owner 112's cloud storage account. Based on the IP address, cloud server 140 may determine the identity of the person or entity that creates the designated digital asset.
  • In some embodiments, cloud server 140 may also trace the past operations performed on the designated digital asset. For example, the metadata may indicate the time when the digital asset was first deposited into owner 112's cloud storage account. The metadata may also describe past modifications to the designated digital asset, when these modifications are performed, and who performed these modifications. The metadata may also indicate who accessed the designated digital asset in the past and when the digital asset was accessed. By examining the metadata, cloud server 140 may determine whether the digital asset has been altered or manipulated since it was created or first owned by owner 112.
  • In some embodiments, cloud server 140 may also trace the chain of custody of the designated digital asset since the creation of the digital asset. For example, the designated digital asset may be a credit report generated by a credit bureau, such as Experian® and TransUnion®, and provided by the credit bureau to owner 112's bank. The bank subsequently shared the credit report with owner 112. As such, by analyzing the metadata, cloud server 140 may determine that the credit bureau, the bank, and owner 112 all have been in possession of the credit report and further determine the respective possession periods.
  • In some embodiments, cloud server 140 may authenticate the digital asset based on credential of the asset's creator. For example, if the designated digital asset is a driving record created by a Department of Motor Vehicles, cloud server 140 may determine that the designated digital asset is authentic.
  • In some embodiments, cloud server 140 may also authenticate the designated digital asset based on historical operations performed on the designated digital asset. For example, if it is determined that the designated digital asset was not modified since it was uploaded into owner 112's cloud storage account, cloud server 140 may determine the digital asset is authentic.
  • In some embodiments, cloud server 140 may also assign an authentication score to the designated digital asset to measure the degree of authenticity. For example, cloud server 140 may assign a high authentication score to a digital asset received by owner 112 from a friend, coworker, or family member, and assign a low authentication score to documents received from a person to whom owner 112 only has a low affinity. As another example, although a digital asset has a long chain of custody, cloud server 140 may still assign a high authentication score to the digital asset if each custodian in the chain is highly credible.
  • It is contemplated that the above are only examples of using provenance information to authenticate a digital asset. The present disclosure does not limit the ways for authenticating the designated digital asset based on the provenance of the digital asset.
  • In optional step 408, cloud server 140 generates authentication information based on the provenance of the designated digital asset. Specifically, cloud server 140 may authenticate the digital asset based on the provenance of the designated digital asset.
  • In some embodiments, if the designated digital asset is determined to be authentic, cloud server 140 may generate an authentication certificate to certify the authenticity of the digital asset. The authentication certificate may be in the form of a document attached to the designated digital asset and indicating that the authenticity of the designated digital asset is certified by the cloud service provider.
  • Alternatively, the authentication certificate may be in the form of a digital signature attached to the designated digital asset. For example, cloud server 140 may create an encrypted digital code appended to the designated digital asset. For example, cloud server 140 may create the encrypted digital code by generating a one-way hash of the designated digital asset and then encrypting the hash with a private key. The presence of a digital certification indicates the designated digital asset is created by a credible user and the digital asset has not been altered without authorization.
  • In some embodiments, cloud server 140 may generate an authentication report indicating the provenance of the designated digital asset. The authentication report may also include an authentication score of the digital asset. For example, if cloud server 140 determines that the creator of the designated digital asset cannot be authenticated or the designated digital asset may have been altered, the authentication report may include a low authentication score and indicate the reasons for such low score.
  • In step 410, cloud server 140 identifies sensitive information in the designated digital asset. Cloud server 140 may analyze patterns of content data in the designated digital asset and identify the data patterns that match the signature patterns of the sensitive information. Specifically, cloud server 140 may determine the file format of the designated digital asset based on the metadata of the digital asset. File format refers to the standard ways that a digital asset can be created and/or stored, such as PDF (Portable Document Format), Microsoft® Word, CSV (Comma Separated Values)), TAX (TurboTax® file), JPEG (Joint Photographic Experts Group), TIFF (Tagged Image File Format), etc. In some embodiments, the designated digital asset may have a file extension specifying the asset's file format. For example, a “doc” file extension indicates that the designated digital asset is a word processing file, a “dbf” file extension indicates that the designated digital asset is a database file, and an “xml” file extension indicates that the designated digital asset is an extensible markup language file.
  • Based on the file format, cloud server 140 may select a file-processing application suitable for accessing the data content of the designated digital asset. For example, cloud server 140 may use a text editor to access a text file and use image-processing software to access image data of a photo.
  • Cloud server 140 may analyze the content data and identify portions of the content data that have patterns matching the signature patterns of the sensitive information. Consistent with the disclosed embodiments, when the content data includes text information, cloud server 140 may identify text fields matching a text pattern such as a social security number, a bank account number, a phone number, a selected word or name, etc. In some embodiments, cloud server 140 may identify the text fields using recognition techniques such as named-entity recognition. Named-entity recognition may be applied to text data to identify and categorize text fields into predefined text categories, e.g., identification numbers, locations, individuals, dates, etc. Once a text field is identified and categorized, cloud server 140 may determine whether the text field corresponds to sensitive information. For example, an identification number such as a social security number, a driver's license number, a phone number, etc., may be defined as sensitive information. As another example, cloud server 140 may consider a text field categorized as an individual as corresponding to sensitive information if the text field matches a name included in a list of predetermined names. In some embodiments, cloud server 140 may also use other pattern-matching techniques to identify certain regular expressions, wildcards, literal character strings, etc.
  • In the disclosed embodiments, when the content data includes image data, cloud server 140 may extract features of the image data and determine whether the features represent a predetermined person or object. For example, owner 112 may prefer not to share her children's photos with other people, and thus set the images of the children as part of the sensitive information. If the designated digital asset is a photo, cloud server 140 may employ an image-recognition application to detect whether the photo contains data representing a child. If data representing a human face are detected, cloud server 140 may determines the photo contains sensitive information. Alternatively, cloud server 140 may employ a facial-recognition application to extract features representing a human face from the image data of the photo, and then compare the extracted features with pre-stored features that represent owner 112's children. If a match is found, cloud server 140 may conclude that the photo contains owner 112's children.
  • In the disclosed embodiments, cloud server 140 may also use optical character recognition (OCR) tools to identify sensitive information contained in the designated digital asset. Specifically, cloud server 140 may convert the designated digital asset into to a document image. Cloud server 140 may then perform OCR on the document image by recognizing the characters in the document image as text and generate a bounding rectangle for each of the characters. A bounding rectangle is described by bounding coordinates on vertical and horizontal axes that form a geometric rectangle surrounding a corresponding character or word in the document image. In some embodiments, the bounding rectangle also includes a buffer area that extends the area surrounding the character. The buffer area may be determined using a preconfigured surrounding threshold that defines the additional area (i.e., additional height and width) that should be included in the bounding rectangle. Further, the preconfigured surrounding threshold may be a random value within a range of potential values so that the buffer area is a different height and width for each bounding rectangle. The buffer area may ensure that redaction boxes generated using the bounding rectangle better obfuscate a redacted character or word.
  • Cloud server 140 may also search for characters and/or words in the OCR results that match the text pattern of certain sensitive information. For example, cloud server 140 may search the OCR results of a document image for a social security number. If characters matching the social security number are found, cloud server 140 may determine the text location of the social security number in the image document as the location of the bounding rectangles of the matching characters.
  • In the disclosed embodiments, cloud server 140 may also identify the sensitive information in the designated digital asset content based on the content of the designated digital asset. For example, the contents of the digital asset may be identified as tax information, medical information, a credit report, photo, purchase receipt, bank account statement, utility bill, etc. The digital asset may contain metadata specifying its content. For example, the header of the designated digital asset may contain a metadata field indicating the content. Based on the content, cloud server 140 may determine which type of sensitive information is present in the designated digital asset. For example, if the digital asset is a tax document, cloud server 140 determines that the relevant sensitive information may include owner 112's tax ID, social security number, annual gross income, etc. As another example, if the digital asset is a family photo, cloud server 140 determines that the relevant sensitive information may include images of owner 112's children.
  • Based on the type of sensitive information in the designated digital asset, cloud server 140 may further locate in the digital asset those data fields with a data pattern matching the determined type of sensitive information. For example, if cloud server 140 determines the digital asset is a tax document and may contain owner 112's social security number, cloud server 140 may specifically search in the digital asset's content for data fields whose format match the format of a social security number. This targeted search improves the efficiency of identifying and locating sensitive in the designated digital asset.
  • In some embodiments, cloud server 140 may also allow owner 112 to select or define the category or type of sensitive information to be redacted from the designated digital asset. For example, cloud server 140 may send instructions to owner device 110 for displaying a user interface. The user interface may list multiple categories of sensitive information selectable by owner 112. These categories may include, but are not limited to, personal identification numbers (e.g., social security number, user account numbers, etc.), phone numbers, physical addresses, doctor's medical notes, child photos, etc. Cloud server 140 may be configured to only remove, redact, or otherwise obscure the user-selected categories of sensitive information from the designated digital asset. This feature allows owner 112 to flexibly define which categories of sensitive information should be removed, redacted, or otherwise obscured in a particular document.
  • Still referring to FIG. 4 , in step 412, cloud server 140 generates a redacted version of the designated digital asset by modifying the content of the designated digital asset to remove, redact, or otherwise obscure the identified sensitive information. Cloud server 140 may generate the redacted version in various manners. In some embodiments, cloud server 140 may generate the redacted version by removing the identified sensitive information from the data constituting the designated digital asset. In some embodiments, cloud server 140 may generate the redacted version by replacing the identified sensitive information with random information that is not related to owner 112. For example, cloud server 140 may replace owner 112's phone number with a randomly generated number that resembles the format of a common phone number. In some embodiments, cloud server 140 may generate the redacted version by generating alteration boxes, e.g., redaction boxes or highlight boxes, to conceal the identified sensitive information. For example, if OCR is used to identify the sensitive information, cloud server 140 may use alteration boxes to cover the bounding rectangles corresponding to the identified sensitive information, and create an updated document image including the alteration boxes, i.e., redactions or highlights. In some embodiments, cloud server 140 may generate the redacted version by obscuring the part of the designated digital asset that includes the identified sensitive information. For example, cloud server 140 may obscure a child face in a photo before the photo is shared.
  • In optional step 414, cloud server 140 causes owner device 110 to display a preview of the redacted version. For example, cloud server 140 may transmit the redacted version to owner device 110 for display via content-sharing application 320. Owner 112 may look at the preview and provide feedback on the redacted version via content-sharing application 320.
  • Owner 112 may accept some, all, or none of the proposed revisions to the digital asset. Owner 112 may also add further revisions to the digital asset. Owner 112 may also change the way the digital asset is revised. For example, the system may propose replacing the owner's social security number with a non-sense set of digits that fit the same format (e.g., replacing the user's social security number with “123-45-6789”). Owner 112 may request that the social security number be redacted using an opaque redaction box to cover the number instead.
  • Consistent with the disclosed embodiments, the user feedback may be used to adjust the redacted version and train a machine learning algorithm to better predict the desired redacting level and data fields that need to be removed, redacted, or otherwise obscured. FIG. 5 is a flowchart of an exemplary method 500 for generating a redacted version of a digital asset, consistent with disclosed embodiments. Referring to FIG. 5 , method 500 may be performed by cloud server 140 to generate a redacted version of the designated version based on user feedback.
  • In step 502, cloud server 140 generates a redacted version of the designated digital asset. Cloud server 140 then causes owner device 110 to display a preview of the redacted version and solicit owner 112′s feedback. If the redacted version is proper, owner 112 may confirm via content-sharing application 320 that the redacted version is approved for sharing. However, if the redacted version needs to be modified, owner 112 may enter annotations in the asset or provide instructions to content-sharing application 320 to indicate how the modifications should be done.
  • In step 504, cloud server 140 receives the user feedback from owner device 110. If the feedback indicates modification to the redacted version is needed, cloud server 140 proceeds to step 506 to update the redacted version based on the user feedback. For example, cloud server 140 may remove, redact, or otherwise obscure, in the designated digital asset, additional data fields that are indicated by owner 112 as containing sensitive information. As another example, if owner 112 indicates certain redacted, removed, or obscured information is not sensitive (i.e., the redaction, removal, or obscuring of the information is not necessary), cloud server 140 may undo the redaction, removal, or obscuring.
  • In step 508, cloud server 140 provides the updated version to owner device 110 for display and seeks owner 112's confirmation. Steps 504-508 can be performed repeatedly until owner 112 confirms that the redacted version is approved for sharing. This way, method 500 allows a user to preview a digital asset prior to sharing it with other people and to make desired adjustments to the digital asset.
  • In step 510, cloud server 140 uses the user feedback to train a machine learning algorithm for identifying sensitive information. The machine learning algorithm may employ a neural network architecture, such as a convolutional neural network (CNN), a deep neural network (DNN), etc. The data fields indicated by owner 112 as containing sensitive information are fed into the neural network to learn the data pattern associated with the sensitive information and the locations of the sensitive information in a digital asset. The trained neural network may then be used in step 502 to determine the proper redaction level for a digital asset and locate the data fields that need to be redacted, removed, or obscured.
  • Referring back to FIG. 4 , in step 416, cloud server 140 provides the redacted version and authentication information of the designated digital asset to a recipient. By providing both the redacted version and authentication information, method 400 provides assurance about the authenticity of the shared digital asset to the recipient, despite part of the information on the shared digital asset is concealed from the recipient.
  • Cloud server 140 may perform step 416 in various manners. In some embodiments, cloud server 140 may send the redacted version and authentication information directly to the recipient's device, e.g., user device 120, third-party computer 130, or owner device 112. In some embodiments, cloud server 140 may send a prompt to the recipient's device, inviting the recipient to access or retrieve the redacted version (and authentication information, if provided) via the recipient's cloud storage account. In some embodiments, cloud server 140 may send a notification message, e.g., an email or text message, to the recipient, inviting the recipient to download the redacted version (and authentication information, if provided) from a secured site. The notification message may include the uniform resource locator (URL) of the site and a downloading password.
  • The disclosed cloud-based content-sharing system can be used by a user to not only share digital assets controlled or owned by the user with other people, but also receive digital content shared by other people to the user. For example, the designated digital asset in method 400 may be originally received by owner 112 from another person or entity, such as user 122 or third party institution 132. For example, user 122 may be a coworker who wants to send a business proposal to owner 112. As another example, third party institution 132 may be a merchant who wants to send a purchase receipt to owner 112, or a clinic which needs to send a lab report to owner 112. FIG. 6 is a flowchart of a method 600 for receiving a shared digital asset, consistent with disclosed embodiments. Referring to FIG. 6 , method 600 may be performed by cloud server 140 and include the following steps.
  • In step 602, cloud server 140 receives a request for uploading a digital asset to owner 112's cloud storage account. The request is sent from a device other than owner device 110, such as user device 120 or third party computer 130.
  • In optional step 604, cloud server 140 verifies credential of the device sending the request. Cloud server 140 may verify the credential in various ways. For example, cloud server 140 may determine whether the request is sent through a verified cloud-storage account. Cloud server 140 may also determine whether the request is sent from a trusted IP address or whether the MAC address of the device sending the request has been registered with cloud server 140 already.
  • In optional step 606, cloud server 140 authenticates the uploaded digital asset based on the credential of the device sending the request. If the credential can be verified, cloud server 140 may determine the digital asset is authentic. For example, if the digital asset is a mortgage statement uploaded by a bank, cloud server 140 may conclude the mortgage statement to be authentic.
  • In optional step 608, cloud server 140 generates metadata of the uploaded digital asset. The metadata may include provenance information and/or content type of the uploaded digital asset. The provenance information may indicate the identity or name of the person or entity that uploads the digital asset, the IP or MAC address of the device from which the digital asset is uploaded, the date and time when the digital asset is uploaded, etc. The content type may specify the type of content in the uploaded digital asset, such as tax document, medical report, credit report, photo, purchase receipt, back account statement, utility bill, etc. The information about the content type may be entered by the person or entity that uploads the digital asset. Cloud server 140 may write the generated metadata into the file head of the uploaded digital asset.
  • In optional step 610, cloud server 140 may encrypt the uploaded digital asset. Specifically, cloud server 140 may apply an algorithm to replace the data of the uploaded digital asset with ciphertext created based on the data. One or more keys may be used to describe a transformation to be applied to the data. The key(s) may then be kept secret such that it may be difficult or impossible to undo the transformation without access to the key(s). Ciphertext may be created based on a wide variety of standards and algorithms. Examples may include symmetric key algorithms, such as the Data Encryption Standard (DES) or Advanced Encryption Standard (AES), or asymmetric key algorithms.
  • In step 612, cloud server 140 saves the digital asset (e.g., the encrypted digital asset) in cloud storage 150. If the digital asset has been encrypted, a decryption process may be used when it is later accessed or retrieved to convert the ciphertext back to its original data based on the key(s) used to create the ciphertext or other key(s) specifically for decrypting the data.
  • In step 614, cloud server 140 notifies owner 112 that the uploaded digital asset is available for access. For example, cloud server 140 may send a prompt to owner device 110, indicating user 122 or third party institution 132 has shared a digital asset with owner 112 and inviting owner 112 to view the uploaded digital asset. As another example, cloud server 140 may notify owner 112 that the uploaded digital asset is available by sending the digital asset to owner 112 (e.g., sending an e-mail with the digital asset attached to owner 112).
  • As described above, methods 400-600 may be performed by cloud server 140. Correspondingly, the present disclosure also provides methods performed by user devices, such as owner device 110. FIG. 7 is a flowchart of an exemplary content-sharing method 700, consistent with disclosed embodiments. For example, method 700 may be performed by owner device 110, or, more specifically, content-sharing application 320 on owner device 110. Referring to FIG. 7 , method 700 may include the following steps.
  • In step 702, owner device 110 displays an interface for sharing content. For example, the interface may be presented through content-sharing application 320.
  • In step 704, owner device 110 receives a selection of a digital asset to be shared and one or more recipients of the digital asset. For example, content-sharing application 320 may display a list of digital assets or file folders currently stored in owner 112's cloud storage account, such that owner 112 may select one of the stored digital assets for sharing. Similarly, content-sharing application 320 may display a list of users who are friends of owner 112, such that owner 112 may select one or more of the users with which to share the digital asset. Alternatively, content-sharing application 320 may provide a search function to search for users or third parties who have accounts with cloud server 140 and select the recipient of the digital asset from the search results. As a further alternative, content-sharing application 320 may allow a user to share a digital asset with a recipient who does not have an account with cloud server 140. In such a case, for example, owner 112 may enter the desired recipient's email address, phone number, or other contact information in content-sharing application 320. Cloud server 140 may then use that contact information to, for example, send the recipient an invitation to create a cloud storage account to access the shared digital asset. Alternatively, system 140 may use the contact information to send the recipient a URL for a site where the recipient may download the shared digital asset (e.g., download the asset as a “guest” or without creating an account). Or cloud server 140 may use the contact information to directly send the digital asset to the recipient (e.g., as an attachment to an e-mail).
  • Optionally, in step 706, owner device 110 may receive a user selection of one or more categories of sensitive information to be removed, redacted, or otherwise obscured from the designated digital asset. Generally, sensitive information used in the present disclosure may refer to any information an owner may want to redact, such as personally identifying information including, but not limited to, medical records, address, photos, social security numbers, financial account numbers, phone numbers, etc. Owner device 110 may also allow owner 112 to define which type(s) of sensitive information should be removed, redacted, or otherwise obscured. For example, user device 112 may display a list of categories of sensitive information for owner 112 to select, such that information in the selected categories will be removed, redacted, or otherwise obscured, while information in the unselected categories will not be altered.
  • In step 708, owner device 110 transmits information about the designated digital asset, identity of the recipient, and user-selected categories of sensitive information to cloud server 140.
  • In step 710, owner device 110 receives a redacted version of the designated digital asset from cloud server 140.
  • In step 712, owner device 110 displays a preview of the redacted version prior to sharing of the designated digital asset. The preview shows how the redacted version will appear when it is viewed by the recipient.
  • In step 714, owner device 110 receives user feedback on the redacted version. In some embodiments, user interface 340 may include a touch screen which displays the preview of the redacted version and allows owner 112 to make annotations directly on the preview. For example, owner 112 may circle around or tab on the data fields that need to be revised. In some embodiments, content-sharing application 320 may provide various redaction tools for owner 112 to manually redact additional data fields on the redacted version or undo certain redactions, removals, or obscuring. In some embodiments, content sharing application 320 may provide options for the type of removal, redaction, or obscuring used (e.g., allowing an owner to use an opaque redaction box instead of substituting non-sense text, etc.).
  • In step 716, owner device 110 transmits the user feedback to cloud server 140, such that cloud server 140 can adjust the redacted version accordingly. In some embodiments, cloud server 140 may send the adjusted version to owner device 110 for user confirmation. In other embodiments, cloud server 140 may directly provide the adjusted version to the recipient, without requesting confirmation from owner 112.
  • In some examples, some or all of the logic for the above-described techniques may be implemented as a computer program or application or as a plug-in module or subcomponent of another application. The described techniques may be varied and are not limited to the examples or descriptions provided.
  • Moreover, while illustrative embodiments have been described herein, the scope thereof includes any and all embodiments having equivalent elements, modifications, omissions, combinations (e.g., of aspects across various embodiments), adaptations and/or alterations as would be appreciated by those in the art based on the present disclosure. For example, the number and orientation of components shown in the exemplary systems may be modified. Further, with respect to the exemplary methods illustrated in the attached drawings, the order and sequence of steps may be modified, and steps may be added or deleted.
  • Thus, the foregoing description has been presented for purposes of illustration only. It is not exhaustive and is not limiting to the precise forms or embodiments disclosed. Modifications and adaptations will be apparent to those skilled in the art from consideration of the specification and practice of the disclosed embodiments. For example, while a financial service provider and merchant have been referred to herein for ease of discussion, it is to be understood that consistent with disclosed embodiments other entities may provide such services in conjunction with or separate from a financial service provider and merchant.
  • The claims are to be interpreted broadly based on the language employed in the claims and not limited to examples described in the present specification, which examples are to be construed as non-exclusive. Further, the steps of the disclosed methods may be modified in any manner, including by reordering steps and/or inserting or deleting steps.
  • Furthermore, although aspects of the disclosed embodiments are described as being associated with data stored in memory and other tangible computer-readable storage mediums, one skilled in the art will appreciate that these aspects may also be stored on and executed from many types of tangible computer-readable media, such as secondary storage devices, like hard disks, floppy disks, or CD-ROM, or other forms of RAM or ROM. Accordingly, the disclosed embodiments are not limited to the above-described examples, but instead is defined by the appended claims in light of their full scope of equivalents.

Claims (20)

What is claimed is:
1. A system for sharing data, comprising:
a memory storing instructions; and
one or more processors in communication with a storage device and configured to execute instructions to perform operations comprising:
receiving, from a client device, an instruction for sharing a designated digital asset stored in the storage device, wherein the designated digital asset comprising content, and wherein the instruction for sharing the designated digital asset indicates a designated recipient and an owner of the designated digital asset; and
in response to the instruction for sharing the designated digital asset, and without further user input:
determining an origin of the designated digital asset based on metadata of the designated digital asset;
analyzing content of the designated digital asset to identify sensitive information by extracting a feature from the content, wherein the sensitive information is based on the origin;
generating, based on analyzing the content, a redacted version of the designated digital asset to obscure the feature in the content; and
providing, to the designated recipient of the designated digital asset, the redacted version of the designated digital asset.
2. The system of claim 1, further comprising:
generating authentication information indicating an origin of the designated digital asset in response to the instruction for sharing the designated digital asset, and without further user input; and
identifying the sensitive information based on whether the designated recipient is the owner.
3. The system of claim 2, wherein the operations further comprise:
determining a provenance of the designated digital asset; and
determining the authentication information based on the provenance.
4. The system of claim 2, wherein the operations further comprise:
determining a digital signature for the designated digital asset; and
determining the authentication information based on the digital signature.
5. The system of claim 1, wherein the origin is determined based on metadata of the designated digital asset, the origin of the designated digital asset including at least one of a source of the designated digital asset, a historical operation performed on the designated digital asset, or a chain of custody of the designated digital asset.
6. The system of claim 1, wherein analyzing content of the designated digital asset to identify the sensitive information further comprises:
identifying signature patterns of the sensitive information; and
identifying portions of the content that have patterns matching the signature patterns
7. The system of claim 1, wherein the operations further comprise providing for display, to the client device, a preview of the redacted version.
8. The system of claim 7, wherein the operations further comprise:
receiving, from the client device, user feedback associated with the preview of the redacted version; and
updating the redacted version of the designated digital asset based on the user feedback.
9. The system of claim 8, wherein the user feedback includes digital annotations on the preview of the redacted version.
10. A computer-implemented method, the method comprising:
receiving, from a client device, an instruction for uploading a designated digital asset, wherein the designated digital asset comprises content, and wherein the instruction for sharing the designated digital asset indicates a designated recipient and an owner of the designated digital asset; and
in response to the instruction for sharing the designated digital asset, and without further user input:
determining a feature extracted from the content that represents sensitive information;
generating a redacted version of the designated digital asset to obscure the feature in the content; and
storing, in a storage device, the redacted version of the designated digital asset.
11. The computer-implemented method of claim 10, further comprising:
generating authentication information indicating an origin of the designated digital asset in response to the instruction for sharing the designated digital asset, and without further user input; and
identifying the sensitive information based on whether the designated recipient is the owner.
12. The computer-implemented method of claim 11, further comprising:
determining a provenance of the designated digital asset; and
determining the authentication information based on the provenance.
13. The computer-implemented method of claim 11, further comprising:
determining a digital signature for the designated digital asset; and
determining the authentication information based on the digital signature.
14. The computer-implemented method of claim 11, wherein determining the origin comprises determining a provenance of the designated digital asset based on metadata of the designated digital as set.
15. The computer-implemented method of claim 14, wherein the provenance of the designated digital asset includes a source of the designated digital asset, a historical operation performed on the designated digital asset, or a chain of custody of the designated digital asset.
16. The computer-implemented method of claim 11, wherein the authentication information comprises at least one of an authentication certificate, a digital signature, or an authentication report.
17. The computer-implemented method of claim 10, further comprising providing for display, to the client device, a preview of the redacted version.
18. The computer-implemented method of claim 17, further comprising:
receiving, from the client device, feedback associated with the preview of the redacted version; and
updating the redacted version of the designated digital asset based on the feedback.
19. The computer-implemented method of claim 18, wherein the feedback includes digital annotations on the preview of the redacted version.
20. A system for sharing data, comprising:
a memory storing instructions; and
one or more processors in communication with a storage device and configured to execute the instructions to perform operations comprising:
receiving an instruction for sharing a designated digital asset, wherein the designated digital asset comprises content; and
in response to the instruction for sharing the designated digital asset, and without further user input:
determining origin information of the designated digital asset;
determining a feature extracted from the content;
generating a redacted version of the designated digital asset to obscure a representation of a person in the content based on whether a designated recipient is an owner; and
providing, to a designated recipient of a designated digital asset the redacted version of the designated digital asset.
US18/481,681 2018-07-05 2023-10-05 Cloud-based system for protecting sensitive information in shared content Pending US20240037277A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US18/481,681 US20240037277A1 (en) 2018-07-05 2023-10-05 Cloud-based system for protecting sensitive information in shared content

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US16/028,373 US10410016B1 (en) 2018-07-05 2018-07-05 Cloud-based system for protecting sensitive information in shared content
US16/535,312 US11120164B2 (en) 2018-07-05 2019-08-08 Cloud-based system for protecting sensitive information in shared content
US17/468,881 US11790118B2 (en) 2018-07-05 2021-09-08 Cloud-based system for protecting sensitive information in shared content
US18/481,681 US20240037277A1 (en) 2018-07-05 2023-10-05 Cloud-based system for protecting sensitive information in shared content

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US17/468,881 Continuation US11790118B2 (en) 2018-07-05 2021-09-08 Cloud-based system for protecting sensitive information in shared content

Publications (1)

Publication Number Publication Date
US20240037277A1 true US20240037277A1 (en) 2024-02-01

Family

ID=67845073

Family Applications (4)

Application Number Title Priority Date Filing Date
US16/028,373 Active 2038-07-29 US10410016B1 (en) 2018-07-05 2018-07-05 Cloud-based system for protecting sensitive information in shared content
US16/535,312 Active 2038-11-01 US11120164B2 (en) 2018-07-05 2019-08-08 Cloud-based system for protecting sensitive information in shared content
US17/468,881 Active 2038-08-11 US11790118B2 (en) 2018-07-05 2021-09-08 Cloud-based system for protecting sensitive information in shared content
US18/481,681 Pending US20240037277A1 (en) 2018-07-05 2023-10-05 Cloud-based system for protecting sensitive information in shared content

Family Applications Before (3)

Application Number Title Priority Date Filing Date
US16/028,373 Active 2038-07-29 US10410016B1 (en) 2018-07-05 2018-07-05 Cloud-based system for protecting sensitive information in shared content
US16/535,312 Active 2038-11-01 US11120164B2 (en) 2018-07-05 2019-08-08 Cloud-based system for protecting sensitive information in shared content
US17/468,881 Active 2038-08-11 US11790118B2 (en) 2018-07-05 2021-09-08 Cloud-based system for protecting sensitive information in shared content

Country Status (1)

Country Link
US (4) US10410016B1 (en)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10410016B1 (en) * 2018-07-05 2019-09-10 Capital One Services, Llc Cloud-based system for protecting sensitive information in shared content
US11570173B2 (en) * 2018-09-18 2023-01-31 Cyral Inc. Behavioral baselining from a data source perspective for detection of compromised users
US11477217B2 (en) 2018-09-18 2022-10-18 Cyral Inc. Intruder detection for a network
US11477197B2 (en) 2018-09-18 2022-10-18 Cyral Inc. Sidecar architecture for stateless proxying to databases
US11087862B2 (en) * 2018-11-21 2021-08-10 General Electric Company Clinical case creation and routing automation
US11538123B1 (en) * 2019-01-23 2022-12-27 Wells Fargo Bank, N.A. Document review and execution on mobile devices
US11140446B2 (en) * 2019-05-15 2021-10-05 Warner Bros. Entertainment Inc. Sensitivity assessment for media production using artificial intelligence
US10977268B2 (en) 2019-05-31 2021-04-13 Snowflake Inc. Data exchange
JP7328797B2 (en) * 2019-06-05 2023-08-17 株式会社日立製作所 Terminal device, character recognition system and character recognition method
US11972004B2 (en) * 2019-06-11 2024-04-30 International Business Machines Corporation Document redaction and reconciliation
JP7287207B2 (en) * 2019-09-13 2023-06-06 富士通株式会社 Information processing device, control program and control method
US11455464B2 (en) * 2019-09-18 2022-09-27 Accenture Global Solutions Limited Document content classification and alteration
US11409906B2 (en) * 2019-10-03 2022-08-09 Accenture Global Solutions Limited Privacy-secure edge-zone digital identity computing for open-loop pixel-state control
US20210377240A1 (en) * 2020-06-02 2021-12-02 FLEX Integration LLC System and methods for tokenized hierarchical secured asset distribution
US20220171879A1 (en) * 2020-11-30 2022-06-02 Therapia Software LLC Privacy controls for managing group telehealth sessions
EP4027674A1 (en) * 2021-01-11 2022-07-13 Ricoh Company, Ltd. Method and apparatus for document processing
US11489889B2 (en) * 2021-01-29 2022-11-01 Avaya Management L.P. Selective content sharing
US11971917B2 (en) * 2021-04-12 2024-04-30 Cisco Technology, Inc. Automatic quoting or forking of chats using deep learning in cloud based chat applications
IT202100021191A1 (en) * 2021-08-04 2023-02-04 Agic Innovation SYSTEM AND METHOD FOR THE ANONYMIZATION OF DATA
EP4287085A1 (en) * 2022-06-03 2023-12-06 Apple Inc. Smart sharing options for populating a shared digital asset library
US12067146B2 (en) * 2022-06-15 2024-08-20 Microsoft Technology Licensing, Llc Method and system of securing sensitive information
US11949840B1 (en) * 2022-11-11 2024-04-02 Kyocera Document Solutions Inc. Redacting confidential information in a document and reversal thereof

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020001395A1 (en) * 2000-01-13 2002-01-03 Davis Bruce L. Authenticating metadata and embedding metadata in watermarks of media signals
US20070030528A1 (en) * 2005-07-29 2007-02-08 Cataphora, Inc. Method and apparatus to provide a unified redaction system
US20090077168A1 (en) * 2007-09-13 2009-03-19 Sadasue Tamon Access control method and access control device
US20100205221A1 (en) * 2009-02-12 2010-08-12 ExaNetworks, Inc. Digital media sharing system in a distributed data storage architecture
US20110161668A1 (en) * 2009-12-30 2011-06-30 Stmicroelectronics S.R.I. Method and devices for distributing media contents and related computer program product
US20140075335A1 (en) * 2012-09-11 2014-03-13 Lucid Software, Inc. Image editing and sharing
US20140281847A1 (en) * 2013-03-15 2014-09-18 Facebook, Inc. Overlaying Photographs With Text On A Social Networking System
US20160019415A1 (en) * 2014-07-17 2016-01-21 At&T Intellectual Property I, L.P. Automated obscurity for pervasive imaging
US20160132719A1 (en) * 2014-11-12 2016-05-12 International Business Machines Corporation Identifying and obscuring faces of specific individuals in an image
US20160358013A1 (en) * 2015-06-02 2016-12-08 Aerdos, Inc. Method and system for ambient proximity sensing techniques between mobile wireless devices for imagery redaction and other applicable uses
US20170099344A1 (en) * 2011-06-08 2017-04-06 Workshare, Ltd. System and method for cross platform document sharing
US20170206523A1 (en) * 2015-11-06 2017-07-20 Cable Television Laboratories, Inc Systems and methods for digital asset security ecosystems
US10410016B1 (en) * 2018-07-05 2019-09-10 Capital One Services, Llc Cloud-based system for protecting sensitive information in shared content

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140156314A1 (en) * 2012-11-30 2014-06-05 John Gunn System and method for trading senior life settlement policies

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020001395A1 (en) * 2000-01-13 2002-01-03 Davis Bruce L. Authenticating metadata and embedding metadata in watermarks of media signals
US20070030528A1 (en) * 2005-07-29 2007-02-08 Cataphora, Inc. Method and apparatus to provide a unified redaction system
US20090077168A1 (en) * 2007-09-13 2009-03-19 Sadasue Tamon Access control method and access control device
US20100205221A1 (en) * 2009-02-12 2010-08-12 ExaNetworks, Inc. Digital media sharing system in a distributed data storage architecture
US20110161668A1 (en) * 2009-12-30 2011-06-30 Stmicroelectronics S.R.I. Method and devices for distributing media contents and related computer program product
US20170099344A1 (en) * 2011-06-08 2017-04-06 Workshare, Ltd. System and method for cross platform document sharing
US20140075335A1 (en) * 2012-09-11 2014-03-13 Lucid Software, Inc. Image editing and sharing
US20140281847A1 (en) * 2013-03-15 2014-09-18 Facebook, Inc. Overlaying Photographs With Text On A Social Networking System
US20160019415A1 (en) * 2014-07-17 2016-01-21 At&T Intellectual Property I, L.P. Automated obscurity for pervasive imaging
US20160132719A1 (en) * 2014-11-12 2016-05-12 International Business Machines Corporation Identifying and obscuring faces of specific individuals in an image
US20160358013A1 (en) * 2015-06-02 2016-12-08 Aerdos, Inc. Method and system for ambient proximity sensing techniques between mobile wireless devices for imagery redaction and other applicable uses
US20170206523A1 (en) * 2015-11-06 2017-07-20 Cable Television Laboratories, Inc Systems and methods for digital asset security ecosystems
US10410016B1 (en) * 2018-07-05 2019-09-10 Capital One Services, Llc Cloud-based system for protecting sensitive information in shared content

Also Published As

Publication number Publication date
US20200012817A1 (en) 2020-01-09
US10410016B1 (en) 2019-09-10
US11790118B2 (en) 2023-10-17
US11120164B2 (en) 2021-09-14
US20210406399A1 (en) 2021-12-30

Similar Documents

Publication Publication Date Title
US11790118B2 (en) Cloud-based system for protecting sensitive information in shared content
US20230129693A1 (en) Transaction authentication and verification using text messages and a distributed ledger
US11588619B2 (en) Generating customized smart contracts
US20170277773A1 (en) Systems and methods for secure storage of user information in a user profile
US20170277774A1 (en) Systems and methods for secure storage of user information in a user profile
US9497173B2 (en) System for the unified organization, secure storage and secure retrieval of digital and paper documents
US9760697B1 (en) Secure interactive electronic vault with dynamic access controls
US11755563B2 (en) Ledger data generation and storage for trusted recall of professional profiles
US20170277775A1 (en) Systems and methods for secure storage of user information in a user profile
WO2017218590A1 (en) Systems and methods for secure storage of user information in a user profile
US9258297B2 (en) Methods, devices, and mediums for securely sharing restricted content
US10055732B1 (en) User and entity authentication through an information storage and communication system
US20160267261A1 (en) System and method for credential management and identity verification
US11327950B2 (en) Ledger data verification and sharing system
US20160314550A1 (en) Limited user contract content sharing
WO2023154940A2 (en) Identity verification and associated platform
US20160117787A1 (en) System and method for testator-mediated inheritor-driven inheritance planning
WO2018232021A2 (en) Systems and methods for secure storage of user information in a user profile
US11977661B2 (en) System for generating a digital handwritten signature using a mobile device
WO2024095755A1 (en) Management server, information processing system, and information processing method
AU2019203287A1 (en) Method and system for proving of identity information
AU2023219787A1 (en) Identity verification and associated platform

Legal Events

Date Code Title Description
AS Assignment

Owner name: CAPITAL ONE SERVICES, LLC, VIRGINIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DAMICK, JEFFREY;REEL/FRAME:065138/0174

Effective date: 20180411

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER